blob: c6276a31c934496d80c2e2038c7c90d1980a3aa9 [file] [log] [blame]
ynwang9fa88232016-06-17 15:05:10 -07001# storaged daemon
ynwange68d2d22016-07-01 12:18:54 -07002type storaged, domain, mlstrustedsubject;
ynwang9fa88232016-06-17 15:05:10 -07003type storaged_exec, exec_type, file_type;
4
5init_daemon_domain(storaged)
6
ynwang9fa88232016-06-17 15:05:10 -07007# Read access to pseudo filesystems
ynwang9fa88232016-06-17 15:05:10 -07008r_dir_file(storaged, sysfs_type)
9r_dir_file(storaged, proc_net)
ynwange68d2d22016-07-01 12:18:54 -070010r_dir_file(storaged, domain)
ynwang9fa88232016-06-17 15:05:10 -070011
Jin Qiand3459062017-01-11 16:20:49 -080012# Read /proc/uid_io/stats
13allow storaged proc_uid_io_stats:file r_file_perms;
14
Jin Qian8ad57ef2017-01-20 20:29:13 -080015# Read /data/system/packages.list
16allow storaged system_data_file:file r_file_perms;
17
ynwange68d2d22016-07-01 12:18:54 -070018allow storaged self:capability { setgid setuid sys_nice sys_ptrace };
ynwang9fa88232016-06-17 15:05:10 -070019
ynwange68d2d22016-07-01 12:18:54 -070020userdebug_or_eng(`
21 # Read access to debugfs
22 allow storaged debugfs_mmc:dir search;
23 allow storaged debugfs_mmc:file r_file_perms;
24')
ynwang9fa88232016-06-17 15:05:10 -070025
ynwange68d2d22016-07-01 12:18:54 -070026# Binder permissions
27allow storaged storaged_service:service_manager add;
Jin Qiand3459062017-01-11 16:20:49 -080028
ynwange68d2d22016-07-01 12:18:54 -070029binder_use(storaged)
30binder_call(storaged, system_server)
31
32###
33### neverallow
34###
35neverallow storaged domain:process ptrace;