blob: 6b7fa50ceea6cdf02f5233cec6ed3cb7d2a15abd [file] [log] [blame]
ynwang9fa88232016-06-17 15:05:10 -07001# storaged daemon
ynwange68d2d22016-07-01 12:18:54 -07002type storaged, domain, mlstrustedsubject;
ynwang9fa88232016-06-17 15:05:10 -07003type storaged_exec, exec_type, file_type;
4
5init_daemon_domain(storaged)
6
ynwang9fa88232016-06-17 15:05:10 -07007# Read access to pseudo filesystems
ynwang9fa88232016-06-17 15:05:10 -07008r_dir_file(storaged, sysfs_type)
9r_dir_file(storaged, proc_net)
ynwange68d2d22016-07-01 12:18:54 -070010r_dir_file(storaged, domain)
ynwang9fa88232016-06-17 15:05:10 -070011
Jin Qiand3459062017-01-11 16:20:49 -080012# Read /proc/uid_io/stats
13allow storaged proc_uid_io_stats:file r_file_perms;
14
ynwange68d2d22016-07-01 12:18:54 -070015allow storaged self:capability { setgid setuid sys_nice sys_ptrace };
ynwang9fa88232016-06-17 15:05:10 -070016
ynwange68d2d22016-07-01 12:18:54 -070017userdebug_or_eng(`
18 # Read access to debugfs
19 allow storaged debugfs_mmc:dir search;
20 allow storaged debugfs_mmc:file r_file_perms;
21')
ynwang9fa88232016-06-17 15:05:10 -070022
ynwange68d2d22016-07-01 12:18:54 -070023# Binder permissions
24allow storaged storaged_service:service_manager add;
Jin Qiand3459062017-01-11 16:20:49 -080025allow storaged permission_service:service_manager find;
26
ynwange68d2d22016-07-01 12:18:54 -070027binder_use(storaged)
28binder_call(storaged, system_server)
29
30###
31### neverallow
32###
33neverallow storaged domain:process ptrace;