blob: 189cdea737db1eddd7cf5993d7e4f382236818bd [file] [log] [blame]
# Policy for /system/bin/time_daemon
type time, domain;
type time_exec, exec_type, file_type;
init_daemon_domain(time)
allow time self:capability { setgid setuid sys_time };
allow time self:socket create_socket_perms;
allowxperm time self:socket ioctl msm_sock_ipc_ioctls;
# /sys/bus/msm_subsys
allow time sysfs:dir r_dir_perms;
r_dir_file(time, sysfs_msm_subsys)
allow time sysfs_soc:dir search;
allow time sysfs_soc:file r_file_perms;
# files in /data/time
allow time time_data_file:file create_file_perms;
allow time time_data_file:dir rw_dir_perms;
allow time rtc_device:chr_file r_file_perms;
userdebug_or_eng(`
allow time diag_device:chr_file rw_file_perms;
')
# TODO(b/36613996): Remove this once system_app no longer communicates over sockets with time daemon
typeattribute time socket_between_core_and_vendor_violators;