1. Mark polices which accessing proc/sysfs file system 2. Add violator attribute to modules violate vendor/system rule. MTK-Commit-Id: 3954cad7a1428cda694d8428c2235a78aa6e7cc8 Change-Id: I401ae5b87eb9a03f324bef83c6678149606b15a8 CR-Id: ALPS03825066 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
21 lines
1.1 KiB
Plaintext
21 lines
1.1 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/audiocmdservice_atci Executable File
|
|
|
|
# Read/Write NV
|
|
allow audiocmdservice_atci nvram_device:devfile_class_set rw_file_perms;
|
|
typeattribute audiocmdservice_atci data_between_core_and_vendor_violators;
|
|
allow audiocmdservice_atci nvram_data_file:dir create_dir_perms;
|
|
allow audiocmdservice_atci nvram_data_file:{file lnk_file} create_file_perms;
|
|
allow audiocmdservice_atci nvdata_file:dir create_dir_perms;
|
|
allow audiocmdservice_atci nvdata_file:file create_file_perms;
|
|
|
|
# Access to storages for audio tuning tool to read/write tuning result
|
|
allow audiocmdservice_atci { block_device device }:dir { write search };
|
|
allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms;
|
|
allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms;
|
|
allow audiocmdservice_atci bootdevice_block_device:blk_file { read write };
|
|
|
|
allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;
|
|
binder_call(audiocmdservice_atci,mtk_hal_audio);
|
|
allow audiocmdservice_atci mtk_audiohal_data_file:dir create_dir_perms;
|