95 lines
2.9 KiB
Plaintext
Raw Normal View History

type charge_only, domain;
type charge_only_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(charge_only)
# Read chargeonly_vendor_data_file
allow charge_only chargeonly_vendor_data_file:dir rw_dir_perms;
allow charge_only chargeonly_vendor_data_file:file create_file_perms;
# Write to /dev/kmsg
allow charge_only kmsg_device:chr_file rw_file_perms;
# Read access to pseudo filesystems.
r_dir_file(charge_only, sysfs_type)
r_dir_file(charge_only, rootfs)
r_dir_file(charge_only, cgroup)
# Self permissions
allow charge_only self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
# Wakelock
wakelock_use(charge_only)
# Allow access to sysfs
allow charge_only sysfs:dir { read open };
allow charge_only sysfs:file rw_file_perms;
# Allow access to wakelock sysfs
allow charge_only sysfs_wake_lock:file rw_file_perms;
# Allow access to battery info sysfs
allow charge_only sysfs_batteryinfo:file r_file_perms;
# Allow access to battery supply sysfs
allow charge_only sysfs_battery_supply:dir r_dir_perms;
allow charge_only sysfs_battery_supply:file r_file_perms;
allow charge_only sysfs_battery_supply:lnk_file r_file_perms;
# Allow access to usb supply sysfs
allow charge_only sysfs_usb_supply:dir r_dir_perms;
allow charge_only sysfs_usb_supply:file r_file_perms;
# Allow access to thermal sysfs
allow charge_only sysfs_thermal:dir r_dir_perms;
allow charge_only sysfs_thermal:file r_file_perms;
allow charge_only sysfs_thermal:lnk_file r_file_perms;
# Allow access to power sysfs
allow charge_only sysfs_power:file rw_file_perms;
# Allow access to graphics sysfs
allow charge_only sysfs_graphics:dir r_dir_perms;
allow charge_only sysfs_graphics:file rw_file_perms;
# Read /sys/fs/pstore/console-ramoops
# Don't worry about overly broad permissions for now, as there's
# only one file in /sys/fs/pstore
allow charge_only pstorefs:dir r_dir_perms;
allow charge_only pstorefs:file r_file_perms;
# Allow access to graphics dev
allow charge_only graphics_device:dir r_dir_perms;
allow charge_only graphics_device:chr_file rw_file_perms;
# Allow access to input dev
allow charge_only input_device:dir r_dir_perms;
allow charge_only input_device:chr_file r_file_perms;
# Allow access to tty dev
allow charge_only tty_device:chr_file rw_file_perms;
# Allow access to rtc dev
allow charge_only rtc_device:chr_file rw_file_perms;
# Allow access to proc_sysrq
allow charge_only proc_sysrq:file rw_file_perms;
# Allow access to persist dir
allow charge_only persist_chargeonly_file:dir r_dir_perms;
allow charge_only persist_chargeonly_file:file r_file_perms;
# Allow access to vendor dir
allow charge_only mnt_vendor_file:dir r_dir_perms;
# Exec shell scripts
allow charge_only vendor_shell_exec:file rx_file_perms;
# Socks
allow charge_only property_socket:sock_file write;
allow charge_only init:unix_stream_socket connectto;
# Props
get_prop(charge_only, powerctl_prop)
set_prop(charge_only, powerctl_prop)
get_prop(charge_only, vendor_display_prop)