1 # rild - radio interface layer daemon 2 type rild, domain; 3 hal_server_domain(rild, hal_telephony) 4 5 net_domain(rild) 6 allowxperm rild self:udp_socket ioctl priv_sock_ioctls; 7 8 allow rild self:netlink_route_socket nlmsg_write; 9 allow rild kernel:system module_request; 10 allow rild self:capability { setpcap setgid setuid net_admin net_raw }; 11 allow rild alarm_device:chr_file rw_file_perms; 12 allow rild cgroup:dir create_dir_perms; 13 allow rild cgroup:{ file lnk_file } r_file_perms; 14 allow rild radio_device:chr_file rw_file_perms; 15 allow rild radio_device:blk_file r_file_perms; 16 allow rild mtd_device:dir search; 17 allow rild efs_file:dir create_dir_perms; 18 allow rild efs_file:file create_file_perms; 19 allow rild shell_exec:file rx_file_perms; 20 allow rild bluetooth_efs_file:file r_file_perms; 21 allow rild bluetooth_efs_file:dir r_dir_perms; 22 allow rild radio_data_file:dir rw_dir_perms; 23 allow rild radio_data_file:file create_file_perms; 24 allow rild sdcard_type:dir r_dir_perms; 25 allow rild system_data_file:dir r_dir_perms; 26 allow rild system_data_file:file r_file_perms; 27 allow rild system_file:file x_file_perms; 28 29 # property service 30 set_prop(rild, radio_prop) 31 32 allow rild tty_device:chr_file rw_file_perms; 33 34 # Allow rild to create and use netlink sockets. 35 allow rild self:netlink_socket create_socket_perms_no_ioctl; 36 allow rild self:netlink_generic_socket create_socket_perms_no_ioctl; 37 allow rild self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; 38 39 # Access to wake locks 40 wakelock_use(rild) 41 42 r_dir_file(rild, proc) 43 r_dir_file(rild, proc_net) 44 r_dir_file(rild, sysfs_type) 45 r_dir_file(rild, system_file) 46 47 # granting the ioctl permission for rild should be device specific 48 allow rild self:socket create_socket_perms_no_ioctl; 49 50