[Detail] There is a workaround for bring-up, now it needs to be modified. [Solution] 1.Split workaround to sepcial *.te 2.Modify ged sepolicy 3.Modify mistake 4.Add sepolicy MTK-Commit-Id: 5a2b7e3fdc826a7ca6bc70a3810f14c1661e7d79 Change-Id: I0894de45e014a5eae754e35b57fbc9b21bc4bf90 CR-Id: ALPS04639771 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
43 lines
1.2 KiB
Plaintext
43 lines
1.2 KiB
Plaintext
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
|
|
typeattribute system_app mlstrustedsubject;
|
|
|
|
# Date : 2017/07/21
|
|
# Purpose :[CdsInfo] read/ write WI-FI MAC address by NVRAM API
|
|
# Package Name: com.mediatek.connectivity
|
|
hal_client_domain(system_app, hal_nvramagent);
|
|
|
|
hal_client_domain(system_app, mtk_hal_lbs)
|
|
|
|
#Dat: 2017/02/14
|
|
#Purpose: allow set telephony Sensitive property
|
|
get_prop(system_app, mtk_telephony_sensitive_prop)
|
|
|
|
|
|
# Date : WK17.12
|
|
# Operation : MT6799 SQC
|
|
# Purpose : Change thermal config
|
|
allow system_app mtk_thermal_config_prop:file { getattr open read };
|
|
|
|
|
|
# Date : 2017/11/07
|
|
# Operation : Migration
|
|
# Purpose : CAT need copy exception db file from data folder
|
|
# Package: CAT tool
|
|
allow system_app aee_exp_data_file:file r_file_perms;
|
|
allow system_app aee_exp_data_file:dir r_dir_perms;
|
|
|
|
# Date: 2018/11/08
|
|
# Operation : JPEG
|
|
# Purpose : JPEG need to use PQ via MMS HIDL
|
|
allow system_app mtk_hal_mms_hwservice:hwservice_manager find;
|
|
allow system_app mtk_hal_mms:binder call;
|
|
|
|
# Date: 2019/06/14
|
|
# Operation : Migration
|
|
# Purpose : system_app need get mtk_amslog_prop
|
|
get_prop(system_app, mtk_amslog_prop)
|
|
get_prop(system_app, vendor_default_prop)
|