轉自:http://blog.csdn.net/tung214/article/details/44461985
Android 5.0下,因爲採取了SEAndroid/SElinux的安全機制,即使擁有root權限,或者對某內核節點設置爲777的權限,仍然無法在JNI層訪問。
- /dev/tegra.* u:object_r:video_device:s0
- /dev/tf_driver u:object_r:tee_device:s0
- /dev/tty u:object_r:owntty_device:s0
- /dev/tty[0-9]* u:object_r:tty_device:s0
- # We add here
- /dev/wf_bt u:object_r:wf_bt_device:s0
- # Device types
- type device, dev_type, fs_type;
- type alarm_device, dev_type, mlstrustedobject;
- type adb_device, dev_type;
- type ashmem_device, dev_type, mlstrustedobject;
- type audio_device, dev_type;
- type binder_device, dev_type, mlstrustedobject;
- type block_device, dev_type;
- # We add here
- type wf_bt_device, dev_type;
- # Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid.
- allow system_server qtaguid_proc:file rw_file_perms;
- allow system_server qtaguid_device:chr_file rw_file_perms;
- # chr_file表示字符設備文件,如果是普通文件用file,目錄請用dir
- # rw_file_perms代表讀寫權限
- allow system_server wf_bt_device:chr_file rw_file_perms;