blob: 9073f978165438f0f1bef7f7ca98846cf9edb163 [file] [log] [blame]
# ==============================================
# Policy File of /vendor/bin/statusd Executable File
# ==============================================
# Common SEPolicy Rule
# =============================================
type statusd_exec, exec_type, file_type, vendor_file_type;
typeattribute statusd mtkimsapdomain;
init_daemon_domain(statusd)
# Dat: 2017/02/14
# Purpose: allow set telephony Sensitive property
set_prop(statusd, vendor_mtk_telephony_sensitive_prop)
allow statusd block_device:dir search;
allow statusd flashlessd_exec:file rx_file_perms;
set_prop(statusd, vendor_mtk_md_prop)
set_prop(statusd, vendor_mtk_net_cdma_mdmstat_prop)
allow statusd nvram_data_file:dir create_dir_perms;
allow statusd nvram_data_file:file create_file_perms;
allow statusd nvram_data_file:lnk_file read;
allow statusd nvdata_file:lnk_file read;
allow statusd nvdata_file:dir create_dir_perms;
allow statusd nvdata_file:file create_file_perms;
allow statusd nvram_device:chr_file rw_file_perms;
allow statusd nvram_device:blk_file rw_file_perms;
allow statusd nvdata_device:blk_file { read write open };
set_prop(statusd, vendor_mtk_ril_cdma_report_prop)
allow statusd self:capability net_admin;
allow statusd self:udp_socket { create ioctl };
allow statusd statusd_socket:sock_file { write setattr };
allow statusd sysfs_wake_lock:file { read write open };
allow statusd c2k_file:dir create_dir_perms;
allow statusd c2k_file:file create_file_perms;
allow statusd ttyMT_device:chr_file { read write ioctl open };
allow statusd ttySDIO_device:chr_file { read write open setattr ioctl};
allow statusd viarild_exec:file rx_file_perms;
allow statusd vmodem_device:chr_file { read write open setattr ioctl};
# property service
set_prop(statusd, vendor_mtk_ril_mux_report_case_prop)
set_prop(statusd, vendor_mtk_cdma_prop)
# Search permission for findPidByName
allow statusd domain:dir search;
# N bringup: viarild is lunched by Statusd, should add the following permission to Status.
allow statusd devpts:chr_file rw_file_perms;
# Andorid O : Add permission to statusd.
allowxperm statusd self:udp_socket ioctl {SIOCDELRT SIOCSIFFLAGS SIOCSIFADDR SIOCKILLADDR SIOCDEVPRIVATE SIOCDEVPRIVATE_1};
allow statusd sysfs_ccci:dir search;
allow statusd sysfs_ccci:file r_file_perms;
allow statusd vndbinder_device:chr_file r_file_perms;