[Detail] avc: denied { find } for interface=android.hardware.audio:: IDevicesFactory sid=u:r:audiocmdservice_atci:s0 pid=4193 scontext=u:r: audiocmdservice_atci:s0 tcontext=u:object_r:hal_audio_hwservice:s0 tclass=hwservice_manager permissive=0 [Solution] hal_client_domain(audiocmdservice_atci, hal_audio) allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find; MTK-Commit-Id: 19954438860104bb7e0036ce92d21429103e6149 Change-Id: Idc7fe552e63aec6e4e1081a0f4681d251b019be3 CR-Id: ALPS04400836 Feature: Audio Tuning Tool Signed-off-by: Kobe Wu <kobe-cp.wu@mediatek.com>
35 lines
1.3 KiB
Plaintext
35 lines
1.3 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/audiocmdservice_atci Executable File
|
|
type audiocmdservice_atci ,domain;
|
|
type audiocmdservice_atci_exec, exec_type, file_type, vendor_file_type;
|
|
|
|
init_daemon_domain(audiocmdservice_atci)
|
|
|
|
unix_socket_connect(atcid, atci-audio, audiocmdservice_atci);
|
|
allow audiocmdservice_atci self:unix_stream_socket { create_socket_perms read write };
|
|
|
|
# Access to storages for audio tuning tool to read/write tuning result
|
|
allow audiocmdservice_atci { block_device device }:dir { write search };
|
|
allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms;
|
|
allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms;
|
|
allow audiocmdservice_atci bootdevice_block_device:blk_file { read write };
|
|
|
|
|
|
# can route /dev/binder traffic to /dev/vndbinder
|
|
vndbinder_use(audiocmdservice_atci)
|
|
binder_call(audiocmdservice_atci,mtk_hal_audio);
|
|
|
|
#Android O porting
|
|
hwbinder_use(audiocmdservice_atci)
|
|
get_prop(audiocmdservice_atci, hwservicemanager_prop);
|
|
#allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;
|
|
|
|
hal_client_domain(audiocmdservice_atci, hal_audio)
|
|
|
|
#To access the file at /dev/kmsg
|
|
allow audiocmdservice_atci kmsg_device:chr_file w_file_perms;
|
|
|
|
userdebug_or_eng(`
|
|
allow audiocmdservice_atci self:capability { sys_nice fowner chown fsetid setuid ipc_lock net_admin};
|
|
')
|