1# ============================================== 2# Policy File of /system/bin/audiocmdservice_atci Executable File 3type audiocmdservice_atci ,domain; 4type audiocmdservice_atci_exec, exec_type, file_type, vendor_file_type; 5 6init_daemon_domain(audiocmdservice_atci) 7 8unix_socket_connect(atcid, atci-audio, audiocmdservice_atci); 9allow audiocmdservice_atci self:unix_stream_socket { create_socket_perms read write }; 10 11# Access to storages for audio tuning tool to read/write tuning result 12allow audiocmdservice_atci block_device:dir { write search }; 13allow audiocmdservice_atci mnt_user_file:dir rw_dir_perms; 14allow audiocmdservice_atci { mnt_user_file storage_file }:lnk_file rw_file_perms; 15allow audiocmdservice_atci bootdevice_block_device:blk_file { read write }; 16 17# can route /dev/binder traffic to /dev/vndbinder 18vndbinder_use(audiocmdservice_atci) 19binder_call(audiocmdservice_atci,mtk_hal_audio); 20 21#Android O porting 22hwbinder_use(audiocmdservice_atci) 23get_prop(audiocmdservice_atci, hwservicemanager_prop) 24 25hal_client_domain(audiocmdservice_atci, hal_audio) 26 27#To access the file at /dev/kmsg 28allow audiocmdservice_atci kmsg_device:chr_file w_file_perms; 29 30userdebug_or_eng(` 31 allow audiocmdservice_atci self:capability { sys_nice fowner chown fsetid setuid ipc_lock net_admin}; 32') 33