device_xiaomi_sweet/sepolicy/vendor/batterysecret.te
Kuba Wojciechowski 01a3bae6f0
sweet: sepolicy: initial rules for batterysecret
* Fixes:
07-25 15:31:45.325     0     0 I init    : starting service 'batterysecret'...
07-25 15:31:45.336     0     0 F init    : cannot setexeccon('u:r:batterysecret:s0') for batterysecret: Invalid argument
07-25 15:31:45.345     0     0 I init    : Service 'batterysecret' (pid 6483) exited with status 6
07-25 15:31:45.345     0     0 I init    : Sending signal 9 to service 'batterysecret' (pid 6483) process group...

Signed-off-by: Kuba Wojciechowski <nullbytepl@gmail.com>
Change-Id: I4c547a0162275a1fb99b1038f8bdd5b1f8632095
2022-05-01 00:16:09 -04:00

52 lines
1.2 KiB
Plaintext

type batterysecret, domain;
type batterysecret_exec, exec_type, vendor_file_type, file_type;
type persist_subsys_file, vendor_persist_type, file_type;
init_daemon_domain(batterysecret)
r_dir_file(batterysecret, cgroup)
r_dir_file(batterysecret, mnt_vendor_file)
r_dir_file(batterysecret, vendor_sysfs_battery_supply)
r_dir_file(batterysecret, sysfs_batteryinfo)
r_dir_file(batterysecret, sysfs_type)
r_dir_file(batterysecret, vendor_sysfs_usb_supply)
r_dir_file(batterysecret, vendor_sysfs_usbpd_device)
allow batterysecret {
mnt_vendor_file
persist_subsys_file
rootfs
}:dir rw_dir_perms;
allow batterysecret {
persist_subsys_file
sysfs
vendor_sysfs_battery_supply
sysfs_usb
vendor_sysfs_usb_supply
vendor_sysfs_usbpd_device
}:file w_file_perms;
allow batterysecret kmsg_device:chr_file w_file_perms;
allow batterysecret self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
allow batterysecret self:global_capability_class_set {
sys_tty_config
sys_boot
};
allow batterysecret self:capability {
chown
fsetid
};
allow batterysecret {
system_suspend_hwservice
hidl_manager_hwservice
}:hwservice_manager find;
binder_call(batterysecret, system_suspend_server)
wakelock_use(batterysecret)