android_device_mediatek_sep.../non_plat/audiocmdservice_atci.te
Bo Ye 5849c224e3 [ALPS03825066] P migration selinux build failed fix
1. Mark polices which accessing proc/sysfs file system
    2. Add violator attribute to modules violate vendor/system rule.

MTK-Commit-Id: 3954cad7a1428cda694d8428c2235a78aa6e7cc8

Change-Id: I401ae5b87eb9a03f324bef83c6678149606b15a8
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-01-18 09:29:36 +08:00

21 lines
1.1 KiB
Plaintext

# ==============================================
# Policy File of /system/bin/audiocmdservice_atci Executable File
# Read/Write NV
allow audiocmdservice_atci nvram_device:devfile_class_set rw_file_perms;
typeattribute audiocmdservice_atci data_between_core_and_vendor_violators;
allow audiocmdservice_atci nvram_data_file:dir create_dir_perms;
allow audiocmdservice_atci nvram_data_file:{file lnk_file} create_file_perms;
allow audiocmdservice_atci nvdata_file:dir create_dir_perms;
allow audiocmdservice_atci nvdata_file:file create_file_perms;
# Access to storages for audio tuning tool to read/write tuning result
allow audiocmdservice_atci { block_device device }:dir { write search };
allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms;
allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms;
allow audiocmdservice_atci bootdevice_block_device:blk_file { read write };
allow audiocmdservice_atci hal_audio_hwservice:hwservice_manager find;
binder_call(audiocmdservice_atci,mtk_hal_audio);
allow audiocmdservice_atci mtk_audiohal_data_file:dir create_dir_perms;