| # ============================================== |
| # Policy File of /vendor/bin/statusd Executable File |
| |
| # ============================================== |
| # Common SEPolicy Rule |
| # ============================================= |
| |
| type statusd_exec, exec_type, file_type, vendor_file_type; |
| typeattribute statusd mtkimsapdomain; |
| |
| init_daemon_domain(statusd) |
| |
| # Dat: 2017/02/14 |
| # Purpose: allow set telephony Sensitive property |
| set_prop(statusd, vendor_mtk_telephony_sensitive_prop) |
| |
| allow statusd block_device:dir search; |
| allow statusd flashlessd_exec:file rx_file_perms; |
| set_prop(statusd, vendor_mtk_md_prop) |
| set_prop(statusd, vendor_mtk_net_cdma_mdmstat_prop) |
| |
| allow statusd nvram_data_file:dir create_dir_perms; |
| allow statusd nvram_data_file:file create_file_perms; |
| allow statusd nvram_data_file:lnk_file read; |
| allow statusd nvdata_file:lnk_file read; |
| allow statusd nvdata_file:dir create_dir_perms; |
| allow statusd nvdata_file:file create_file_perms; |
| allow statusd nvram_device:chr_file rw_file_perms; |
| allow statusd nvram_device:blk_file rw_file_perms; |
| |
| allow statusd nvdata_device:blk_file { read write open }; |
| set_prop(statusd, vendor_mtk_ril_cdma_report_prop) |
| allow statusd self:capability net_admin; |
| allow statusd self:udp_socket { create ioctl }; |
| allow statusd statusd_socket:sock_file { write setattr }; |
| allow statusd sysfs_wake_lock:file { read write open }; |
| |
| allow statusd c2k_file:dir create_dir_perms; |
| allow statusd c2k_file:file create_file_perms; |
| allow statusd ttyMT_device:chr_file { read write ioctl open }; |
| allow statusd ttySDIO_device:chr_file { read write open setattr ioctl}; |
| allow statusd viarild_exec:file rx_file_perms; |
| allow statusd vmodem_device:chr_file { read write open setattr ioctl}; |
| |
| # property service |
| set_prop(statusd, vendor_mtk_ril_mux_report_case_prop) |
| set_prop(statusd, vendor_mtk_cdma_prop) |
| |
| # Search permission for findPidByName |
| allow statusd domain:dir search; |
| |
| # N bringup: viarild is lunched by Statusd, should add the following permission to Status. |
| allow statusd devpts:chr_file rw_file_perms; |
| |
| # Andorid O : Add permission to statusd. |
| allowxperm statusd self:udp_socket ioctl {SIOCDELRT SIOCSIFFLAGS SIOCSIFADDR SIOCKILLADDR SIOCDEVPRIVATE SIOCDEVPRIVATE_1}; |
| allow statusd sysfs_ccci:dir search; |
| allow statusd sysfs_ccci:file r_file_perms; |
| allow statusd vndbinder_device:chr_file r_file_perms; |