Home | History | Annotate | Download | only in sepolicy
      1 # qcom-usb-sh service
      2 type qcom-usb-sh, domain;
      3 type qcom-usb-sh_exec, exec_type, file_type;
      4 
      5 # Started by init
      6 init_daemon_domain(qcom-usb-sh)
      7 
      8 # Allow changing the owner of /sys/devices/virtual/hsicctl/hsicctl0/modem_wait.
      9 allow qcom-usb-sh sysfs_hsic_modem_wait:file { getattr setattr };
     10 
     11 # qcom.usb.sh needs to restore the context of /sys/devices/virtual/hsicctl/hsicctl0/modem_wait
     12 # as it may not be properly labeled when accessed.
     13 allow qcom-usb-sh sysfs:file relabelfrom;
     14 allow qcom-usb-sh sysfs_hsic_modem_wait:file relabelto;
     15 
     16 # Follow links from /sys/class/android_usb/* to /sys/devices/virtual/android_usb/*.
     17 allow qcom-usb-sh sysfs_usb:lnk_file read;
     18 
     19 # Allow write access to USB related sysfs nodes.
     20 allow qcom-usb-sh sysfs_usb:dir search;
     21 allow qcom-usb-sh sysfs_usb:file w_file_perms;
     22 
     23 allow qcom-usb-sh self:capability chown;
     24 
     25 allow qcom-usb-sh shell_exec:file r_file_perms;
     26 
     27 allow qcom-usb-sh toolbox_exec:file rx_file_perms;
     28 
     29 allow qcom-usb-sh rootfs:file r_file_perms;
     30