[Detail] New sepolicy path declared and also support legacy android. MTK-Commit-Id: 8982268bbef8f852c153428f1a5f83849953c7c2 Change-Id: Ic10f297a312ff2e89e44a0aa323ffa11bc78ff6e CR-Id: ALPS04767749 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
35 lines
1.3 KiB
Plaintext
35 lines
1.3 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/audiocmdservice_atci Executable File
|
|
type audiocmdservice_atci ,domain;
|
|
type audiocmdservice_atci_exec, exec_type, file_type, vendor_file_type;
|
|
|
|
init_daemon_domain(audiocmdservice_atci)
|
|
|
|
unix_socket_connect(atcid, atci-audio, audiocmdservice_atci);
|
|
allow audiocmdservice_atci self:unix_stream_socket { create_socket_perms read write };
|
|
|
|
# Access to storages for audio tuning tool to read/write tuning result
|
|
allow audiocmdservice_atci { block_device device }:dir { write search };
|
|
allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms;
|
|
allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms;
|
|
allow audiocmdservice_atci bootdevice_block_device:blk_file { read write };
|
|
|
|
|
|
# can route /dev/binder traffic to /dev/vndbinder
|
|
vndbinder_use(audiocmdservice_atci)
|
|
binder_call(audiocmdservice_atci,mtk_hal_audio);
|
|
|
|
#Android O porting
|
|
hwbinder_use(audiocmdservice_atci)
|
|
get_prop(audiocmdservice_atci, hwservicemanager_prop);
|
|
#allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;
|
|
|
|
hal_client_domain(audiocmdservice_atci, hal_audio)
|
|
|
|
#To access the file at /dev/kmsg
|
|
allow audiocmdservice_atci kmsg_device:chr_file w_file_perms;
|
|
|
|
userdebug_or_eng(`
|
|
allow audiocmdservice_atci self:capability { sys_nice fowner chown fsetid setuid ipc_lock net_admin};
|
|
')
|