[Detail] There are some selinux violation for app in MTBF, need to add some sepolicy for them. [Solution] 1.Add sepolicy 2.Move sepolicy of untrusted_app_* to untrusted_app_*.te 3.Modify sepolicy MTK-Commit-Id: 62b5c74c6d1d85acf0184fc18fca0b40c4a8e60c Change-Id: Icac33ccc54b691ee0e4ab7088f77adb1c1a4a549 CR-Id: ALPS04640303 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
47 lines
1.3 KiB
Plaintext
47 lines
1.3 KiB
Plaintext
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
|
|
typeattribute system_app mlstrustedsubject;
|
|
|
|
# Date : 2017/07/21
|
|
# Purpose :[CdsInfo] read/ write WI-FI MAC address by NVRAM API
|
|
# Package Name: com.mediatek.connectivity
|
|
hal_client_domain(system_app, hal_nvramagent);
|
|
|
|
hal_client_domain(system_app, mtk_hal_lbs)
|
|
|
|
#Dat: 2017/02/14
|
|
#Purpose: allow set telephony Sensitive property
|
|
get_prop(system_app, mtk_telephony_sensitive_prop)
|
|
|
|
|
|
# Date : WK17.12
|
|
# Operation : MT6799 SQC
|
|
# Purpose : Change thermal config
|
|
allow system_app mtk_thermal_config_prop:file { getattr open read };
|
|
|
|
|
|
# Date : 2017/11/07
|
|
# Operation : Migration
|
|
# Purpose : CAT need copy exception db file from data folder
|
|
# Package: CAT tool
|
|
allow system_app aee_exp_data_file:file r_file_perms;
|
|
allow system_app aee_exp_data_file:dir r_dir_perms;
|
|
|
|
# Date: 2018/11/08
|
|
# Operation : JPEG
|
|
# Purpose : JPEG need to use PQ via MMS HIDL
|
|
allow system_app mtk_hal_mms_hwservice:hwservice_manager find;
|
|
allow system_app mtk_hal_mms:binder call;
|
|
|
|
# Date: 2019/06/14
|
|
# Operation : Migration
|
|
# Purpose : system_app need vendor_default_prop
|
|
get_prop(system_app, vendor_default_prop)
|
|
|
|
# Date: 2019/06/17
|
|
# Operation : Migration
|
|
# Purpose :allow system_app to read mtk_em_tel_log_prop
|
|
get_prop(system_app, mtk_em_tel_log_prop)
|