Shanshan Guo 1086506de4 [ALPS04345534] SEPolicy: add permission for system_app
[Detail]
For Andorid Q, there is a more stringent restriction for ioctl,
system_app need to access proc_ged by ioctlcmd=0x6700

MTK-Commit-Id: c610a674e4a9dcdadde0eb619326359253f59f15

Change-Id: I33cd7c4e29b6bec1dc0956cf6d4a136f08f1d511
CR-Id: ALPS04345534
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-01-18 10:08:47 +08:00

37 lines
1.1 KiB
Plaintext

# ==============================================
# MTK Policy Rule
# ==============================================
typeattribute system_app mlstrustedsubject;
# Date : 2017/07/21
# Purpose :[CdsInfo] read/ write WI-FI MAC address by NVRAM API
# Package Name: com.mediatek.connectivity
hal_client_domain(system_app, hal_nvramagent);
hal_client_domain(system_app, mtk_hal_lbs)
#Dat: 2017/02/14
#Purpose: allow set telephony Sensitive property
get_prop(system_app, mtk_telephony_sensitive_prop)
# Date : WK17.12
# Operation : MT6799 SQC
# Purpose : Change thermal config
allow system_app mtk_thermal_config_prop:file { getattr open read };
# Date : 2017/11/07
# Operation : Migration
# Purpose : CAT need copy exception db file from data folder
# Package: CAT tool
allow system_app aee_exp_data_file:file r_file_perms;
allow system_app aee_exp_data_file:dir r_dir_perms;
allow system_app md_monitor:unix_stream_socket connectto;
# Date : WK19.11
# Operation: Q migration
# Purpose : Allow system_app to use ioctl/ioctlcmd
allowxperm system_app proc_ged:file ioctl GED_BRIDGE_IO_LOG_BUF_GET;