60 lines
2.3 KiB
Plaintext
60 lines
2.3 KiB
Plaintext
|
# ==============================================
|
||
|
# Policy File of /vendor/bin/statusd Executable File
|
||
|
|
||
|
# ==============================================
|
||
|
# Common SEPolicy Rule
|
||
|
# =============================================
|
||
|
|
||
|
type statusd_exec, exec_type, file_type, vendor_file_type;
|
||
|
typeattribute statusd mtkimsapdomain;
|
||
|
|
||
|
init_daemon_domain(statusd)
|
||
|
|
||
|
# Dat: 2017/02/14
|
||
|
# Purpose: allow set telephony Sensitive property
|
||
|
set_prop(statusd, vendor_mtk_telephony_sensitive_prop)
|
||
|
|
||
|
allow statusd block_device:dir search;
|
||
|
allow statusd flashlessd_exec:file rx_file_perms;
|
||
|
set_prop(statusd, vendor_mtk_md_prop)
|
||
|
set_prop(statusd, vendor_mtk_net_cdma_mdmstat_prop)
|
||
|
|
||
|
allow statusd nvram_data_file:dir create_dir_perms;
|
||
|
allow statusd nvram_data_file:file create_file_perms;
|
||
|
allow statusd nvram_data_file:lnk_file read;
|
||
|
allow statusd nvdata_file:lnk_file read;
|
||
|
allow statusd nvdata_file:dir create_dir_perms;
|
||
|
allow statusd nvdata_file:file create_file_perms;
|
||
|
allow statusd nvram_device:chr_file rw_file_perms;
|
||
|
allow statusd nvram_device:blk_file rw_file_perms;
|
||
|
|
||
|
allow statusd nvdata_device:blk_file { read write open };
|
||
|
set_prop(statusd, vendor_mtk_ril_cdma_report_prop)
|
||
|
allow statusd self:capability net_admin;
|
||
|
allow statusd self:udp_socket { create ioctl };
|
||
|
allow statusd statusd_socket:sock_file { write setattr };
|
||
|
allow statusd sysfs_wake_lock:file { read write open };
|
||
|
|
||
|
allow statusd c2k_file:dir create_dir_perms;
|
||
|
allow statusd c2k_file:file create_file_perms;
|
||
|
allow statusd ttyMT_device:chr_file { read write ioctl open };
|
||
|
allow statusd ttySDIO_device:chr_file { read write open setattr ioctl};
|
||
|
allow statusd viarild_exec:file rx_file_perms;
|
||
|
allow statusd vmodem_device:chr_file { read write open setattr ioctl};
|
||
|
|
||
|
# property service
|
||
|
set_prop(statusd, vendor_mtk_ril_mux_report_case_prop)
|
||
|
set_prop(statusd, vendor_mtk_cdma_prop)
|
||
|
|
||
|
# Search permission for findPidByName
|
||
|
allow statusd domain:dir search;
|
||
|
|
||
|
# N bringup: viarild is lunched by Statusd, should add the following permission to Status.
|
||
|
allow statusd devpts:chr_file rw_file_perms;
|
||
|
|
||
|
# Andorid O : Add permission to statusd.
|
||
|
allowxperm statusd self:udp_socket ioctl {SIOCDELRT SIOCSIFFLAGS SIOCSIFADDR SIOCKILLADDR SIOCDEVPRIVATE SIOCDEVPRIVATE_1};
|
||
|
allow statusd sysfs_ccci:dir search;
|
||
|
allow statusd sysfs_ccci:file r_file_perms;
|
||
|
allow statusd vndbinder_device:chr_file r_file_perms;
|