08d4c8fa6e
This commit adds fake 31.0 prebuilt. The prebuilt is based on AOSP policy, but slightly modified so the set of types and attributes is a subset of real 31.0 prebuilt (sc-dev policy). Steps taken to make the fake prebuilt: 1) build plat_sepolicy.cil both on AOSP and sc-dev, with lunch target aosp_arm64-eng. 2) diff both outputs to find out which types and attributes don't exist. 3) remove all relevant files and statements. As a result, the following types are removed. artd artd_exec artd_service power_stats_service transformer_service virtualizationservice virtualizationservice_data_file virtualizationservice_exec Bug: 189161483 Test: N/A, will do after adding 31.0 mapping files. Change-Id: Ia957fc32b1838dae730d9dd7bd917d684d4a24cf Merged-In: Ia4ea2999f4bc8ae80f13e51d99fba3e98e293447
44 lines
2.1 KiB
Text
44 lines
2.1 KiB
Text
# HwBinder IPC from client to server, and callbacks
|
|
binder_call(hal_telephony_client, hal_telephony_server)
|
|
binder_call(hal_telephony_server, hal_telephony_client)
|
|
|
|
hal_attribute_hwservice(hal_telephony, hal_telephony_hwservice)
|
|
|
|
allowxperm hal_telephony_server self:udp_socket ioctl priv_sock_ioctls;
|
|
|
|
allow hal_telephony_server self:netlink_route_socket nlmsg_write;
|
|
allow hal_telephony_server kernel:system module_request;
|
|
allow hal_telephony_server self:global_capability_class_set { setpcap setgid setuid net_admin net_raw };
|
|
allow hal_telephony_server cgroup:dir create_dir_perms;
|
|
allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
|
allow hal_telephony_server cgroup_v2:dir create_dir_perms;
|
|
allow hal_telephony_server cgroup_v2:{ file lnk_file } r_file_perms;
|
|
allow hal_telephony_server radio_device:chr_file rw_file_perms;
|
|
allow hal_telephony_server radio_device:blk_file r_file_perms;
|
|
allow hal_telephony_server efs_file:dir create_dir_perms;
|
|
allow hal_telephony_server efs_file:file create_file_perms;
|
|
allow hal_telephony_server vendor_shell_exec:file rx_file_perms;
|
|
allow hal_telephony_server bluetooth_efs_file:file r_file_perms;
|
|
allow hal_telephony_server bluetooth_efs_file:dir r_dir_perms;
|
|
|
|
# property service
|
|
get_prop(hal_telephony_server, telephony_config_prop)
|
|
set_prop(hal_telephony_server, radio_control_prop)
|
|
set_prop(hal_telephony_server, radio_prop)
|
|
set_prop(hal_telephony_server, telephony_status_prop)
|
|
|
|
allow hal_telephony_server tty_device:chr_file rw_file_perms;
|
|
|
|
# Allow hal_telephony_server to create and use netlink sockets.
|
|
allow hal_telephony_server self:netlink_socket create_socket_perms_no_ioctl;
|
|
allow hal_telephony_server self:netlink_generic_socket create_socket_perms_no_ioctl;
|
|
allow hal_telephony_server self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
|
|
|
|
# Access to wake locks
|
|
wakelock_use(hal_telephony_server)
|
|
|
|
r_dir_file(hal_telephony_server, proc_net_type)
|
|
r_dir_file(hal_telephony_server, sysfs_type)
|
|
|
|
# granting the ioctl permission for hal_telephony_server should be device specific
|
|
allow hal_telephony_server self:socket create_socket_perms_no_ioctl;
|