Integrate nfc_power and rild rules from tuna sepolicy by Bryan Hinton.
diff --git a/file.te b/file.te
index 7d7f5fc..312ace8 100644
--- a/file.te
+++ b/file.te
@@ -8,6 +8,7 @@
type cgroup, fs_type, mlstrustedobject;
type sysfs, fs_type, mlstrustedobject;
type sysfs_writable, fs_type, sysfs_type, mlstrustedobject;
+type sysfs_nfc_power_writable, fs_type, sysfs_type, mlstrustedobject;
type inotify, fs_type, mlstrustedobject;
type devpts, fs_type;
type tmpfs, fs_type;
diff --git a/file_contexts b/file_contexts
index 9c8325a..1f9781c 100644
--- a/file_contexts
+++ b/file_contexts
@@ -132,3 +132,4 @@
# sysfs files
#
/sys/qemu_trace/process_name -- u:object_r:sysfs_writable:s0
+/sys/devices/platform/nfc-power/nfc_power -- u:object_r:sysfs_nfc_power_writable:s0
diff --git a/nfc.te b/nfc.te
index b20d236..72c2d69 100644
--- a/nfc.te
+++ b/nfc.te
@@ -8,3 +8,5 @@
# Data file accesses.
allow nfc nfc_data_file:dir create_dir_perms;
allow nfc nfc_data_file:notdevfile_class_set create_file_perms;
+
+allow nfc sysfs_nfc_power_writable:file rw_file_perms;
diff --git a/rild.te b/rild.te
index 2857892..5993af4 100644
--- a/rild.te
+++ b/rild.te
@@ -4,6 +4,7 @@
init_daemon_domain(rild)
net_domain(rild)
+allow rild self:netlink_route_socket setopt;
allow rild kernel:system module_request;
unix_socket_connect(rild, property, init)
unix_socket_connect(rild, qemud, qemud)
diff --git a/system.te b/system.te
index 7f299c9..5fa9a91 100644
--- a/system.te
+++ b/system.te
@@ -113,6 +113,7 @@
# XXX Label sysfs files with a specific type?
allow system sysfs:file rw_file_perms;
+allow system sysfs_nfc_power_writable:file rw_file_perms;
# Access devices.
allow system device:dir r_dir_perms;