forked from CyanogenMod/android_device_qcom_sepolicy
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdiag.te
30 lines (30 loc) · 1.36 KB
/
diag.te
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
type diag, domain;
type diag_exec, exec_type, file_type;
# Our BSPs still use diag for logging on a ton of components.
# Allow access in user builds for now.
#userdebug_or_eng(`
domain_auto_trans(shell, diag_exec, diag)
domain_auto_trans(adbd, diag_exec, diag)
file_type_auto_trans(diag, system_data_file, diag_data_file);
allow diag diag_device:chr_file {ioctl read write open getattr};
allow diag devpts:chr_file {ioctl read write open getattr};
allow diag shell:fd {use};
#allow diag su:fd {use};
allow diag cgroup:dir { create add_name };
allow diag console_device:chr_file { read write };
allow diag port:tcp_socket name_connect;
allow diag sdcard_internal:dir { create add_name write search };
allow diag self:capability { setuid net_raw sys_admin setgid dac_override };
allow diag self:capability2 { syslog block_suspend };
allow diag self:tcp_socket { create connect setopt};
allow diag sysfs_wake_lock:file { write open append };
allow diag kernel:system syslog_mod;
# allow drmdiagapp access to drm related paths
allow diag persist_file:dir r_dir_perms;
r_dir_file(diag, persist_data_file)
# Write to drm related pieces of persist partition
allow diag persist_drm_file:dir create_dir_perms;
allow diag persist_drm_file:file create_file_perms;
# allow access to qseecom for drmdiagapp
allow sectest tee_device:chr_file rw_file_perms;
#')