android_device_mediatek_sep.../non_plat/audiocmdservice_atci.te
Kobe Wu a25d1ca12f [ALPS04400836] Fix SELinux issue
[Detail]
avc:  denied  { find } for interface=android.hardware.audio::
IDevicesFactory sid=u:r:audiocmdservice_atci:s0 pid=4193 scontext=u:r:
audiocmdservice_atci:s0 tcontext=u:object_r:hal_audio_hwservice:s0
tclass=hwservice_manager permissive=0

[Solution]
hal_client_domain(audiocmdservice_atci, hal_audio)
allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;

MTK-Commit-Id: 19954438860104bb7e0036ce92d21429103e6149

Change-Id: Idc7fe552e63aec6e4e1081a0f4681d251b019be3
CR-Id: ALPS04400836
Feature: Audio Tuning Tool
Signed-off-by: Kobe Wu <kobe-cp.wu@mediatek.com>
2020-01-18 10:10:18 +08:00

35 lines
1.3 KiB
Plaintext

# ==============================================
# Policy File of /system/bin/audiocmdservice_atci Executable File
type audiocmdservice_atci ,domain;
type audiocmdservice_atci_exec, exec_type, file_type, vendor_file_type;
init_daemon_domain(audiocmdservice_atci)
unix_socket_connect(atcid, atci-audio, audiocmdservice_atci);
allow audiocmdservice_atci self:unix_stream_socket { create_socket_perms read write };
# Access to storages for audio tuning tool to read/write tuning result
allow audiocmdservice_atci { block_device device }:dir { write search };
allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms;
allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms;
allow audiocmdservice_atci bootdevice_block_device:blk_file { read write };
# can route /dev/binder traffic to /dev/vndbinder
vndbinder_use(audiocmdservice_atci)
binder_call(audiocmdservice_atci,mtk_hal_audio);
#Android O porting
hwbinder_use(audiocmdservice_atci)
get_prop(audiocmdservice_atci, hwservicemanager_prop);
#allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;
hal_client_domain(audiocmdservice_atci, hal_audio)
#To access the file at /dev/kmsg
allow audiocmdservice_atci kmsg_device:chr_file w_file_perms;
userdebug_or_eng(`
allow audiocmdservice_atci self:capability { sys_nice fowner chown fsetid setuid ipc_lock net_admin};
')