system_writes_vendor_properties_violators is only workaround, and will cause *TS test fail, so remove the workaround and corresponding rules that cause build fail. MTK-Commit-Id: f637c1416b591c821bc9c18fd3dbf3aa5f9038af Change-Id: If09922120de0742ec47d7c0522168d4e78a4e74f CR-Id: ALPS03878175 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
32 lines
935 B
Plaintext
32 lines
935 B
Plaintext
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
|
|
typeattribute system_app mlstrustedsubject;
|
|
|
|
# Date : 2017/07/21
|
|
# Purpose :[CdsInfo] read/ write WI-FI MAC address by NVRAM API
|
|
# Package Name: com.mediatek.connectivity
|
|
hal_client_domain(system_app, hal_nvramagent);
|
|
|
|
hal_client_domain(system_app, mtk_hal_lbs)
|
|
|
|
#Dat: 2017/02/14
|
|
#Purpose: allow set telephony Sensitive property
|
|
get_prop(system_app, mtk_telephony_sensitive_prop)
|
|
|
|
|
|
# Date : WK17.12
|
|
# Operation : MT6799 SQC
|
|
# Purpose : Change thermal config
|
|
allow system_app mtk_thermal_config_prop:file { getattr open read };
|
|
|
|
|
|
# Date : 2017/11/07
|
|
# Operation : Migration
|
|
# Purpose : CAT need copy exception db file from data folder
|
|
# Package: CAT tool
|
|
allow system_app aee_exp_data_file:file r_file_perms;
|
|
allow system_app aee_exp_data_file:dir r_dir_perms;
|
|
allow system_app md_monitor:unix_stream_socket connectto;
|