aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/statusd.te
diff options
context:
space:
mode:
authorMister Oyster <oysterized@gmail.com>2017-01-02 12:44:35 +0100
committerMister Oyster <oysterized@gmail.com>2017-01-02 12:44:35 +0100
commita184d985bf43d3fe6eeba971bc6b32f79ea38b37 (patch)
tree6f6e56e090777cc149bc1ab39e5987cc2b03e867 /sepolicy/statusd.te
initial releasecm-13.0
Diffstat (limited to 'sepolicy/statusd.te')
-rw-r--r--sepolicy/statusd.te49
1 files changed, 49 insertions, 0 deletions
diff --git a/sepolicy/statusd.te b/sepolicy/statusd.te
new file mode 100644
index 0000000..647512e
--- /dev/null
+++ b/sepolicy/statusd.te
@@ -0,0 +1,49 @@
+# ==============================================
+# Policy File of /system/bin/statusd Executable File
+
+type statusd_exec, exec_type, file_type;
+type statusd, domain;
+
+#permissive statusd;
+
+init_daemon_domain(statusd)
+
+allow statusd block_device:dir search;
+allow statusd ctl_pppd_via_prop:property_service set;
+allow statusd flashlessd_exec:file { read execute open execute_no_trans };
+allow statusd init:unix_stream_socket connectto;
+allow statusd mtk_md_prop:property_service set;
+allow statusd net_cdma_mdmstat:property_service set;
+allow statusd net_radio_prop:property_service set;
+allow statusd nvram_data_file:dir { search add_name write remove_name read open};
+allow statusd nvram_data_file:file { create write open read getattr setattr};
+allow statusd nvram_data_file:lnk_file { read};
+allow statusd nvdata_file:dir { search add_name write remove_name read open};
+allow statusd nvdata_file:file { create write open read getattr setattr};
+allow statusd platformblk_device:blk_file { read write open };
+allow statusd platformblk_device:dir search;
+allow statusd property_socket:sock_file write;
+allow statusd radio_prop:property_service set;
+allow statusd ril_cdma_report_prop:property_service set;
+allow statusd self:capability net_admin;
+allow statusd self:udp_socket { create ioctl };
+allow statusd statusd_socket:sock_file { write setattr };
+allow statusd sysfs_wake_lock:file { read write open };
+allow statusd system_data_file:dir { write add_name };
+allow statusd system_data_file:sock_file { write create setattr };
+allow statusd system_file:file execute_no_trans;
+allow statusd ttyMT_device:chr_file { read write ioctl open };
+allow statusd ttySDIO_device:chr_file { read write open setattr ioctl};
+allow statusd viarild_exec:file { read execute open execute_no_trans };
+allow statusd vmodem_device:chr_file { read write open setattr ioctl};
+
+# property service
+allow statusd system_prop:property_service set;
+allow statusd system_radio_prop:property_service set;
+allow statusd persist_ril_prop:property_service set;
+allow statusd ril_mux_report_case_prop:property_service set;
+auditallow statusd net_radio_prop:property_service set;
+auditallow statusd system_radio_prop:property_service set;
+
+#Search permission for findPidByName
+allow statusd domain:dir search;