blob: e6fd7c395c9bcd12acbdf7b0285394969e151d90 [file] [log] [blame]
type dlkm_loader, domain;
type dlkm_loader_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(dlkm_loader)
# Allow insmod on vendor, system and system_dlkm partitions
allow dlkm_loader self:capability net_admin;
allow dlkm_loader self:capability sys_module;
allow dlkm_loader system_dlkm_file:dir r_dir_perms;
allow dlkm_loader system_dlkm_file:file r_file_perms;
allow dlkm_loader system_dlkm_file:system module_load;
allow dlkm_loader system_file:system module_load;
allow dlkm_loader vendor_file:system module_load;
# needed for libmodprobe to read kernel commandline
allow dlkm_loader proc_bootconfig:file r_file_perms;
allow dlkm_loader proc_cmdline:file r_file_perms;
# Needed because CONFIG_USB_DUMMY_HCD adds some additional logic to
# finit_module() syscall, causing that syscall to create/update keyrings.
# Once we remove CONFIG_USB_DUMMY_HCD config, self:key write permission can be
# removed.
allow dlkm_loader self:key write;
# Needed because CONFIG_DMABUF_HEAPS_DEFERRED_FREE calls sched_set_normal()
# in its module_init() function, which is attributed to dlkm_loader.
allow dlkm_loader kernel:process setsched;
allow dlkm_loader self:capability sys_nice;
# Allow writing to kernel log
allow dlkm_loader kmsg_device:chr_file rw_file_perms;
# dlkm_loader searches tracefs while looking for modules
dontaudit dlkm_loader debugfs_bootreceiver_tracing:dir search;
dontaudit dlkm_loader debugfs_mm_events_tracing:dir search;
set_prop(dlkm_loader, vendor_device_prop)