1# in addition to ioctl commands granted to domain allow system_server to use:
2allowxperm system_server self:udp_socket ioctl priv_sock_ioctls;
3
4# At a minimum, used for GPS (b/32290392)
5allow system_server self:socket ioctl; # create already in core policy
6allowxperm system_server self:socket ioctl msm_sock_ipc_ioctls;
7
8# /dev/uhid
9allow system_server uhid_device:chr_file rw_file_perms;
10
11# TODO(b/36613917): Remove this once system_server no longer communicates with netmgrd over sockets.
12typeattribute netmgrd socket_between_core_and_vendor_violators;
13allow system_server netmgrd_socket:dir search;
14unix_socket_connect(system_server, netmgrd, netmgrd)
15
16binder_call(system_server, hal_camera_default)
17binder_call(system_server, location)
18
19# files in /sys
20r_dir_file(system_server, sysfs_type)
21
22# interact with thermal_config
23set_prop(system_server, thermal_prop)
24
25# rpm
26r_dir_file(system_server, debugfs_rpm)
27
28# /vendor/usr/keylayout
29r_dir_file(system_server, idc_file)
30# /vendor/usr/idc
31r_dir_file(system_server, keylayout_file)
32
33# kgsl
34allow system_server debugfs_kgsl:file { open read getattr };
35
36userdebug_or_eng(`
37  allow system_server diag_device:chr_file rw_file_perms;
38')
39
40# allow system server to set sched fifo for sensor hal main thread to achieve right performance
41allow system_server hal_sensors_default:process setsched;
42