Merge "[RCS] Add sepolicy for RCS as non-system app" into sc-dev
This commit is contained in:
commit
be1f56dba1
6 changed files with 26 additions and 0 deletions
3
tracking_denials/vendor_rcs_app.te
Normal file
3
tracking_denials/vendor_rcs_app.te
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
# b/183935382
|
||||||
|
dontaudit vendor_rcs_app default_prop:file { read };
|
||||||
|
dontaudit vendor_rcs_app default_prop:file { read };
|
1
whitechapel/vendor/google/property.te
vendored
1
whitechapel/vendor/google/property.te
vendored
|
@ -1,6 +1,7 @@
|
||||||
# For Exynos Properties
|
# For Exynos Properties
|
||||||
vendor_internal_prop(vendor_prop)
|
vendor_internal_prop(vendor_prop)
|
||||||
vendor_internal_prop(vendor_ims_prop)
|
vendor_internal_prop(vendor_ims_prop)
|
||||||
|
vendor_internal_prop(vendor_rcs_prop)
|
||||||
vendor_internal_prop(vendor_rild_prop)
|
vendor_internal_prop(vendor_rild_prop)
|
||||||
vendor_internal_prop(vendor_slog_prop)
|
vendor_internal_prop(vendor_slog_prop)
|
||||||
vendor_internal_prop(sensors_prop)
|
vendor_internal_prop(sensors_prop)
|
||||||
|
|
1
whitechapel/vendor/google/rild.te
vendored
1
whitechapel/vendor/google/rild.te
vendored
|
@ -24,6 +24,7 @@ binder_call(rild, hal_secure_element_default)
|
||||||
binder_call(rild, platform_app)
|
binder_call(rild, platform_app)
|
||||||
binder_call(rild, modem_svc_sit)
|
binder_call(rild, modem_svc_sit)
|
||||||
binder_call(rild, vendor_ims_app)
|
binder_call(rild, vendor_ims_app)
|
||||||
|
binder_call(rild, vendor_rcs_app)
|
||||||
|
|
||||||
# for hal service
|
# for hal service
|
||||||
add_hwservice(rild, hal_exynos_rild_hwservice)
|
add_hwservice(rild, hal_exynos_rild_hwservice)
|
||||||
|
|
2
whitechapel/vendor/google/seapp_contexts
vendored
2
whitechapel/vendor/google/seapp_contexts
vendored
|
@ -9,6 +9,8 @@ user=system seinfo=platform name=com.samsung.slsi.telephony.networktestmode doma
|
||||||
# Samsung S.LSI IMS
|
# Samsung S.LSI IMS
|
||||||
user=_app isPrivApp=true name=com.shannon.imsservice domain=vendor_ims_app levelFrom=all
|
user=_app isPrivApp=true name=com.shannon.imsservice domain=vendor_ims_app levelFrom=all
|
||||||
user=_app isPrivApp=true name=com.shannon.imsservice:remote domain=vendor_ims_app levelFrom=all
|
user=_app isPrivApp=true name=com.shannon.imsservice:remote domain=vendor_ims_app levelFrom=all
|
||||||
|
user=_app isPrivApp=true name=com.shannon.rcsservice domain=vendor_rcs_app levelFrom=all
|
||||||
|
user=_app isPrivApp=true name=com.shannon.rcsservice:remote domain=vendor_rcs_app levelFrom=all
|
||||||
user=_app isPrivApp=true name=com.shannon.qualifiednetworksservice domain=vendor_ims_app levelFrom=all
|
user=_app isPrivApp=true name=com.shannon.qualifiednetworksservice domain=vendor_ims_app levelFrom=all
|
||||||
|
|
||||||
# coredump/ramdump
|
# coredump/ramdump
|
||||||
|
|
1
whitechapel/vendor/google/vendor_init.te
vendored
1
whitechapel/vendor/google/vendor_init.te
vendored
|
@ -6,6 +6,7 @@ set_prop(vendor_init, vendor_usb_config_prop)
|
||||||
set_prop(vendor_init, vendor_slog_prop)
|
set_prop(vendor_init, vendor_slog_prop)
|
||||||
set_prop(vendor_init, vendor_sys_default_prop)
|
set_prop(vendor_init, vendor_sys_default_prop)
|
||||||
set_prop(vendor_init, vendor_ims_prop)
|
set_prop(vendor_init, vendor_ims_prop)
|
||||||
|
set_prop(vendor_init, vendor_rcs_prop)
|
||||||
set_prop(vendor_init, vendor_ssrdump_prop)
|
set_prop(vendor_init, vendor_ssrdump_prop)
|
||||||
set_prop(vendor_init, vendor_ro_config_default_prop)
|
set_prop(vendor_init, vendor_ro_config_default_prop)
|
||||||
get_prop(vendor_init, vendor_touchpanel_prop)
|
get_prop(vendor_init, vendor_touchpanel_prop)
|
||||||
|
|
18
whitechapel/vendor/google/vendor_rcs_app.te
vendored
Normal file
18
whitechapel/vendor/google/vendor_rcs_app.te
vendored
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
type vendor_rcs_app, domain;
|
||||||
|
app_domain(vendor_rcs_app)
|
||||||
|
net_domain(vendor_rcs_app)
|
||||||
|
|
||||||
|
allow vendor_rcs_app app_api_service:service_manager find;
|
||||||
|
allow vendor_rcs_app audioserver_service:service_manager find;
|
||||||
|
allow vendor_rcs_app radio_service:service_manager find;
|
||||||
|
allow vendor_rcs_app mediaserver_service:service_manager find;
|
||||||
|
allow vendor_rcs_app cameraserver_service:service_manager find;
|
||||||
|
|
||||||
|
allow vendor_rcs_app privapp_data_file:dir create_dir_perms;
|
||||||
|
allow vendor_rcs_app privapp_data_file:file create_file_perms;
|
||||||
|
|
||||||
|
allow vendor_rcs_app hal_exynos_rild_hwservice:hwservice_manager find;
|
||||||
|
|
||||||
|
binder_call(vendor_rcs_app, rild)
|
||||||
|
set_prop(vendor_rcs_app, vendor_rild_prop)
|
||||||
|
set_prop(vendor_rcs_app, radio_prop)
|
Loading…
Add table
Add a link
Reference in a new issue