blob: 1aa1ed96516f5ffd2da8368aaf6727f7b39b35da (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
|
# ==============================================
# MTK Policy Rule
# ============
# Date : WK14.XX
# Operation : Migration
# Purpose : for exec labels defined by mtk
allow shell mtk_6620_launcher_exec:file rx_file_perms;
allow shell GoogleOtaBinder_exec:file rx_file_perms;
allow shell MtkCodecService_exec:file rx_file_perms;
allow shell aee_core_forwarder_exec:file rx_file_perms;
allow shell akmd8963_exec:file rx_file_perms;
allow shell akmd8975_exec:file rx_file_perms;
allow shell ami304d_exec:file rx_file_perms;
allow shell zygote_exec:file rx_file_perms;
allow shell atci_service_exec:file rx_file_perms;
allow shell atcid_exec:file rx_file_perms;
allow shell audiocmdservice_atci_exec:file rx_file_perms;
allow shell autokd_exec:file rx_file_perms;
allow shell batterywarning_exec:file rx_file_perms;
allow shell bmm050d_exec:file rx_file_perms;
allow shell boot_logo_updater_exec:file rx_file_perms;
allow shell bootanim_exec:file rx_file_perms;
allow shell ccci_fsd_exec:file rx_file_perms;
allow shell ccci_mdinit_exec:file rx_file_perms;
allow shell clatd_exec:file rx_file_perms;
allow shell debuggerd_exec:file rx_file_perms;
allow shell dex2oat_exec:file rx_file_perms;
allow shell dhcp6c_exec:file rx_file_perms;
allow shell dhcp_exec:file rx_file_perms;
allow shell dmlog_exec:file rx_file_perms;
allow shell dnsmasq_exec:file rx_file_perms;
allow shell drmserver_exec:file rx_file_perms;
allow shell dualmdlogger_exec:file rx_file_perms;
allow shell dumpstate_exec:file rx_file_perms;
allow shell em_svr_exec:file rx_file_perms;
allow shell emdlogger_exec:file rx_file_perms;
allow shell factory_exec:file rx_file_perms;
allow shell geomagneticd_exec:file rx_file_perms;
allow shell gsm0710muxd_exec:file rx_file_perms;
allow shell gsm0710muxdmd2_exec:file rx_file_perms;
allow shell hostapd_exec:file rx_file_perms;
allow shell installd_exec:file rx_file_perms;
allow shell keystore_exec:file rx_file_perms;
allow shell lmkd_exec:file rx_file_perms;
allow shell logd_exec:file rx_file_perms;
allow shell matv_exec:file rx_file_perms;
allow shell mc6420d_exec:file rx_file_perms;
allow shell mdlogger_exec:file rx_file_perms;
allow shell mdnsd_exec:file rx_file_perms;
allow shell mediaserver_exec:file rx_file_perms;
allow shell memsicd_exec:file rx_file_perms;
allow shell memsicd3416x_exec:file rx_file_perms;
allow shell mobile_log_d_exec:file rx_file_perms;
allow shell msensord_exec:file rx_file_perms;
allow shell mtk_agpsd_exec:file rx_file_perms;
allow shell mtkbt_exec:file rx_file_perms;
allow shell mtkrild_exec:file rx_file_perms;
allow shell mtkrildmd2_exec:file rx_file_perms;
allow shell mtp_exec:file rx_file_perms;
allow shell muxreport_exec:file rx_file_perms;
allow shell netdiag_exec:file rx_file_perms;
allow shell nvram_agent_binder_exec:file rx_file_perms;
allow shell nvram_daemon_exec:file rx_file_perms;
allow shell orientationd_exec:file rx_file_perms;
allow shell dex2oat_exec:file rx_file_perms;
allow shell ppl_agent_exec:file rx_file_perms;
allow shell ppp_exec:file rx_file_perms;
allow shell pq_exec:file rx_file_perms;
allow shell racoon_exec:file rx_file_perms;
allow shell runas_exec:file rx_file_perms;
allow shell s62xd_exec:file rx_file_perms;
allow shell sdcardd_exec:file rx_file_perms;
allow shell shell_exec:file rx_file_perms;
allow shell sn_exec:file rx_file_perms;
allow shell thermal_exec:file rx_file_perms;
allow shell thermal_manager_exec:file rx_file_perms;
allow shell thermald_exec:file rx_file_perms;
allow shell tiny_mkswap_exec:file rx_file_perms;
allow shell tiny_swapon_exec:file rx_file_perms;
allow shell wifi2agps_exec:file rx_file_perms;
allow shell wmt_loader_exec:file rx_file_perms;
allow shell wpa_exec:file rx_file_perms;
allow shell xlog_exec:file rx_file_perms;
# Date : WK14.47
# Operation : Migration
# Purpose : for accessing /storage/emulated/legacy
# It's mounted as tmpfs file.
# CTS: testSyncFiles_extStorageVariable & testSyncFiles_normal
allow shell tmpfs:lnk_file read;
allow shell tmpfs:lnk_file getattr;
allow shell block_device:dir search;
# Date : WK14.47
# Operation : Migration
# Purpose : for debugging in user debug load.
# su does't exist on user load.
userdebug_or_eng(`
allow shell su_exec:file rx_file_perms;
')
# Date : WK14.46
# Operation : Migration
# Purpose : for MTK Emulator HW GPU
allow shell qemu_pipe_device:chr_file rw_file_perms;
# GAT ls /data/aee_exp/db.xxxx
allow shell aee_exp_data_file:dir r_dir_perms;
allow shell aee_exp_data_file:file r_file_perms;
|