blob: f07f0bab8aaaecd9b999e358934677ba9ad063a5 [file] [log] [blame]
Alex Klyubin53656c12017-04-13 19:05:27 -07001# HwBinder IPC from client to server, and callbacks
2binder_call(hal_telephony_client, hal_telephony_server)
3binder_call(hal_telephony_server, hal_telephony_client)
4
Steven Moreland8fc79812018-05-30 16:43:17 -07005hal_attribute_hwservice_client(hal_telephony, hal_telephony_hwservice)
Alex Klyubin53656c12017-04-13 19:05:27 -07006
Amit Mahajan30073442018-03-12 17:12:09 +00007allowxperm hal_telephony_server self:udp_socket ioctl priv_sock_ioctls;
8
9allow hal_telephony_server self:netlink_route_socket nlmsg_write;
10allow hal_telephony_server kernel:system module_request;
11allow hal_telephony_server self:global_capability_class_set { setpcap setgid setuid net_admin net_raw };
12allow hal_telephony_server alarm_device:chr_file rw_file_perms;
13allow hal_telephony_server cgroup:dir create_dir_perms;
14allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
15allow hal_telephony_server radio_device:chr_file rw_file_perms;
16allow hal_telephony_server radio_device:blk_file r_file_perms;
17allow hal_telephony_server mtd_device:dir search;
18allow hal_telephony_server efs_file:dir create_dir_perms;
19allow hal_telephony_server efs_file:file create_file_perms;
20allow hal_telephony_server vendor_shell_exec:file rx_file_perms;
21allow hal_telephony_server bluetooth_efs_file:file r_file_perms;
22allow hal_telephony_server bluetooth_efs_file:dir r_dir_perms;
Amit Mahajan30073442018-03-12 17:12:09 +000023
24# property service
25set_prop(hal_telephony_server, radio_prop)
26set_prop(hal_telephony_server, exported_radio_prop)
27set_prop(hal_telephony_server, exported2_radio_prop)
Jaekyun Seokac8c6e32018-03-27 13:41:47 +090028set_prop(hal_telephony_server, exported3_radio_prop)
Amit Mahajan30073442018-03-12 17:12:09 +000029
30allow hal_telephony_server tty_device:chr_file rw_file_perms;
31
32# Allow hal_telephony_server to create and use netlink sockets.
33allow hal_telephony_server self:netlink_socket create_socket_perms_no_ioctl;
34allow hal_telephony_server self:netlink_generic_socket create_socket_perms_no_ioctl;
35allow hal_telephony_server self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
36
37# Access to wake locks
38wakelock_use(hal_telephony_server)
39
Jeff Vander Stoep7a4af302018-04-10 12:47:48 -070040r_dir_file(hal_telephony_server, proc_net_type)
Amit Mahajan30073442018-03-12 17:12:09 +000041r_dir_file(hal_telephony_server, sysfs_type)
42r_dir_file(hal_telephony_server, system_file)
43
44# granting the ioctl permission for hal_telephony_server should be device specific
45allow hal_telephony_server self:socket create_socket_perms_no_ioctl;