gs201: telephony property for cbd
Bug: 315104803 Change-Id: I2560871e9477a5f8dcd9519b6c60353e89c5df82
This commit is contained in:
parent
2b9b7cc688
commit
60c66448ef
8 changed files with 15 additions and 1 deletions
5
system_ext/private/pixelntnservice_app.te
Normal file
5
system_ext/private/pixelntnservice_app.te
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
typeattribute pixelntnservice_app coredomain;
|
||||||
|
|
||||||
|
app_domain(pixelntnservice_app);
|
||||||
|
allow pixelntnservice_app app_api_service:service_manager find;
|
||||||
|
set_prop(pixelntnservice_app, telephony_modem_prop)
|
|
@ -2,4 +2,5 @@
|
||||||
persist.fingerprint.ghbm u:object_r:fingerprint_ghbm_prop:s0 exact bool
|
persist.fingerprint.ghbm u:object_r:fingerprint_ghbm_prop:s0 exact bool
|
||||||
|
|
||||||
# Telephony
|
# Telephony
|
||||||
|
telephony.TnNtn.image_switch u:object_r:telephony_modem_prop:s0 exact enum ntn tn
|
||||||
telephony.ril.silent_reset u:object_r:telephony_ril_prop:s0 exact bool
|
telephony.ril.silent_reset u:object_r:telephony_ril_prop:s0 exact bool
|
||||||
|
|
|
@ -8,3 +8,5 @@ user=_app seinfo=platform name=com.android.hbmsvmanager domain=hbmsvmanager_app
|
||||||
# TODO(b/222204912): Should this run under uwb user?
|
# TODO(b/222204912): Should this run under uwb user?
|
||||||
user=_app isPrivApp=true seinfo=uwb name=com.qorvo.uwb.vendorservice domain=uwb_vendor_app type=uwb_vendor_data_file levelFrom=all
|
user=_app isPrivApp=true seinfo=uwb name=com.qorvo.uwb.vendorservice domain=uwb_vendor_app type=uwb_vendor_data_file levelFrom=all
|
||||||
|
|
||||||
|
# PixelNtnService
|
||||||
|
user=system seinfo=platform name=com.google.android.satellite domain=pixelntnservice_app type=app_data_file levelFrom=all
|
||||||
|
|
1
system_ext/public/pixelntnservice_app.te
Normal file
1
system_ext/public/pixelntnservice_app.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
type pixelntnservice_app, domain;
|
|
@ -3,7 +3,8 @@ system_vendor_config_prop(fingerprint_ghbm_prop)
|
||||||
|
|
||||||
# Telephony
|
# Telephony
|
||||||
system_public_prop(telephony_ril_prop)
|
system_public_prop(telephony_ril_prop)
|
||||||
|
system_restricted_prop(telephony_modem_prop)
|
||||||
|
|
||||||
userdebug_or_eng(`
|
userdebug_or_eng(`
|
||||||
set_prop(shell, telephony_ril_prop)
|
set_prop(shell, telephony_ril_prop)
|
||||||
')
|
')
|
||||||
|
|
|
@ -5,6 +5,7 @@ init_daemon_domain(cbd)
|
||||||
set_prop(cbd, vendor_modem_prop)
|
set_prop(cbd, vendor_modem_prop)
|
||||||
set_prop(cbd, vendor_cbd_prop)
|
set_prop(cbd, vendor_cbd_prop)
|
||||||
set_prop(cbd, vendor_rild_prop)
|
set_prop(cbd, vendor_rild_prop)
|
||||||
|
get_prop(cbd, telephony_modem_prop)
|
||||||
|
|
||||||
# Allow cbd to set gid/uid from too to radio
|
# Allow cbd to set gid/uid from too to radio
|
||||||
allow cbd self:capability { setgid setuid };
|
allow cbd self:capability { setgid setuid };
|
||||||
|
|
|
@ -32,6 +32,7 @@ allow rfsd radio_device:chr_file rw_file_perms;
|
||||||
# Allow to set rild and modem property
|
# Allow to set rild and modem property
|
||||||
set_prop(rfsd, vendor_modem_prop)
|
set_prop(rfsd, vendor_modem_prop)
|
||||||
set_prop(rfsd, vendor_rild_prop)
|
set_prop(rfsd, vendor_rild_prop)
|
||||||
|
set_prop(cbd, vendor_cbd_prop)
|
||||||
|
|
||||||
# Allow rfsd to access modem image file/dir
|
# Allow rfsd to access modem image file/dir
|
||||||
allow rfsd modem_img_file:dir r_dir_perms;
|
allow rfsd modem_img_file:dir r_dir_perms;
|
||||||
|
|
|
@ -11,6 +11,8 @@ set_prop(vendor_init, vendor_usb_config_prop)
|
||||||
set_prop(vendor_init, vendor_rild_prop)
|
set_prop(vendor_init, vendor_rild_prop)
|
||||||
set_prop(vendor_init, logpersistd_logging_prop)
|
set_prop(vendor_init, logpersistd_logging_prop)
|
||||||
set_prop(vendor_init, vendor_logger_prop)
|
set_prop(vendor_init, vendor_logger_prop)
|
||||||
|
get_prop(vendor_init, telephony_modem_prop)
|
||||||
|
|
||||||
|
|
||||||
allow vendor_init proc_dirty:file w_file_perms;
|
allow vendor_init proc_dirty:file w_file_perms;
|
||||||
allow vendor_init proc_sched:file w_file_perms;
|
allow vendor_init proc_sched:file w_file_perms;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue