mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Merge changes I45a49628,Icf764bf3 into oc-dr1-dev
* changes: Fix netmgrd crash recovery denials sepolicy: Separate system partition sepolicy and hal macros from vendor partition
This commit is contained in:
committed by
Android (Google) Code Review
commit
f5ed4d3d87
21
sepolicy/private/dataservice_app.te
Normal file
21
sepolicy/private/dataservice_app.te
Normal file
@@ -0,0 +1,21 @@
|
||||
typeattribute dataservice_app coredomain;
|
||||
app_domain(dataservice_app)
|
||||
net_domain(dataservice_app)
|
||||
|
||||
add_service(dataservice_app, cne_service)
|
||||
add_service(dataservice_app, uce_service)
|
||||
allow dataservice_app {
|
||||
app_api_service
|
||||
system_api_service
|
||||
audioserver_service
|
||||
radio_service
|
||||
}:service_manager find;
|
||||
|
||||
allow dataservice_app hal_imsrcsd_hwservice:hwservice_manager find;
|
||||
allow dataservice_app hal_cne_hwservice:hwservice_manager find;
|
||||
|
||||
allow dataservice_app system_app_data_file:dir create_dir_perms;
|
||||
allow dataservice_app system_app_data_file:{ file lnk_file } create_file_perms;
|
||||
|
||||
hwbinder_use(dataservice_app)
|
||||
|
||||
1
sepolicy/private/radio.te
Normal file
1
sepolicy/private/radio.te
Normal file
@@ -0,0 +1 @@
|
||||
allow radio uce_service:service_manager find;
|
||||
2
sepolicy/private/service.te
Normal file
2
sepolicy/private/service.te
Normal file
@@ -0,0 +1,2 @@
|
||||
type cne_service, service_manager_type;
|
||||
type uce_service, service_manager_type;
|
||||
@@ -1 +1,3 @@
|
||||
qti.ims.ext u:object_r:radio_service:s0
|
||||
cneservice u:object_r:cne_service:s0
|
||||
uce u:object_r:uce_service:s0
|
||||
|
||||
1
sepolicy/public/dataservice_app.te
Normal file
1
sepolicy/public/dataservice_app.te
Normal file
@@ -0,0 +1 @@
|
||||
type dataservice_app, domain;
|
||||
2
sepolicy/public/hwservice.te
Normal file
2
sepolicy/public/hwservice.te
Normal file
@@ -0,0 +1,2 @@
|
||||
type hal_cne_hwservice, hwservice_manager_type;
|
||||
type hal_imsrcsd_hwservice, hwservice_manager_type;
|
||||
17
sepolicy/vendor/dataservice_app.te
vendored
17
sepolicy/vendor/dataservice_app.te
vendored
@@ -1,25 +1,8 @@
|
||||
#TODO Move this to sepolicy/private/dataservice_app.te (b/62574674)
|
||||
type dataservice_app, domain, coredomain;
|
||||
app_domain(dataservice_app)
|
||||
net_domain(dataservice_app)
|
||||
|
||||
get_prop(dataservice_app, cnd_prop)
|
||||
add_service(dataservice_app, cne_service)
|
||||
add_service(dataservice_app, uce_service)
|
||||
allow dataservice_app { app_api_service system_api_service audioserver_service radio_service } :service_manager find;
|
||||
|
||||
r_dir_file(dataservice_app, sysfs_msm_subsys)
|
||||
#TODO Move this to sepolicy/private/dataservice_app.te (b/62574674)
|
||||
allow dataservice_app hal_imsrcsd_hwservice:hwservice_manager find;
|
||||
|
||||
#TODO remove the following 2 if dataservice is moved out of system as part of b/38043081
|
||||
allow dataservice_app system_app_data_file:dir create_dir_perms;
|
||||
allow dataservice_app system_app_data_file:{ file lnk_file } create_file_perms;
|
||||
|
||||
#TODO Move this to sepolicy/private/dataservice_app.te (b/62574674)
|
||||
allow dataservice_app hal_cne_hwservice:hwservice_manager find;
|
||||
binder_call(dataservice_app, cnd)
|
||||
hwbinder_use(dataservice_app)
|
||||
|
||||
# imsrcsd to bind with UceShimService.apk
|
||||
binder_call(dataservice_app, hal_rcsservice)
|
||||
|
||||
4
sepolicy/vendor/hwservice.te
vendored
4
sepolicy/vendor/hwservice.te
vendored
@@ -1,6 +1,4 @@
|
||||
type vnd_ims_radio_hwservice, hwservice_manager_type;
|
||||
type vnd_qcrilhook_hwservice, hwservice_manager_type;
|
||||
type hal_imsrtp_hwservice, hwservice_manager_type;
|
||||
#TODO Move the following 2 types public SE policy (b/62574674)
|
||||
type hal_cne_hwservice, hwservice_manager_type;
|
||||
type hal_imsrcsd_hwservice, hwservice_manager_type;
|
||||
type hal_ipacm_hwservice, hwservice_manager_type;
|
||||
|
||||
5
sepolicy/vendor/netmgrd.te
vendored
5
sepolicy/vendor/netmgrd.te
vendored
@@ -11,7 +11,7 @@ set_prop(netmgrd, net_rmnet_prop)
|
||||
unix_socket_connect(netmgrd, netd, netd)
|
||||
|
||||
allow netmgrd netmgrd_socket:dir w_dir_perms;
|
||||
allow netmgrd netmgrd_socket:sock_file { create setattr };
|
||||
allow netmgrd netmgrd_socket:sock_file create_file_perms;
|
||||
allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write };
|
||||
allow netmgrd self:netlink_generic_socket create_socket_perms_no_ioctl;
|
||||
allow netmgrd self:netlink_route_socket nlmsg_write;
|
||||
@@ -38,6 +38,9 @@ domain_auto_trans(netmgrd, netutils_wrapper_exec, netutils_wrapper)
|
||||
|
||||
#Allow diag logging
|
||||
allow netmgrd sysfs_timestamp_switch:file { read open };
|
||||
userdebug_or_eng(`
|
||||
r_dir_file(netmgrd, sysfs_diag)
|
||||
')
|
||||
|
||||
#Ignore if device loading for private IOCTL failed
|
||||
dontaudit netmgrd kernel:system { module_request };
|
||||
|
||||
1
sepolicy/vendor/radio.te
vendored
1
sepolicy/vendor/radio.te
vendored
@@ -15,7 +15,6 @@ allow radio hal_imsrtp_hwservice:hwservice_manager find;
|
||||
|
||||
add_service(radio, radio_service)
|
||||
allow radio {
|
||||
uce_service
|
||||
mediaextractor_service
|
||||
mediacodec_service
|
||||
}:service_manager find;
|
||||
|
||||
2
sepolicy/vendor/service.te
vendored
2
sepolicy/vendor/service.te
vendored
@@ -1,3 +1 @@
|
||||
type cne_service, service_manager_type;
|
||||
type uce_service, service_manager_type;
|
||||
type imsuce_service, service_manager_type;
|
||||
|
||||
2
sepolicy/vendor/service_contexts
vendored
2
sepolicy/vendor/service_contexts
vendored
@@ -1,5 +1,3 @@
|
||||
rcs u:object_r:radio_service:s0
|
||||
cneservice u:object_r:cne_service:s0
|
||||
com.fingerprints.extension.IFingerprintNavigation u:object_r:fingerprint_service:s0
|
||||
uce u:object_r:uce_service:s0
|
||||
com.qualcomm.qti.uceservice u:object_r:imsuce_service:s0
|
||||
|
||||
Reference in New Issue
Block a user