seandroid: Restructuring sepolicy codebase

Seandroid codebase is restructured using this gerrit
All the sepolicies which are common acress all the
chipsets needs to be kept inside common folder. And
all the other policies which are specific to target,
should be kept inside the folder with the chipset name
i.e, all the policies specific to 8084 should be
inside apq8084 folder.

Change-Id: I14734e2d3b9d6a0846a2c99e942c8da9495fa6ab
This commit is contained in:
Avijit Kanti Das
2014-08-08 16:09:14 -07:00
committed by Ravi Kumar Siddojigari
parent 70de069f41
commit 65b23fed9c
39 changed files with 49 additions and 26 deletions

View File

@@ -1,7 +1,9 @@
# Board specific SELinux policy variable definitions
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy \
device/qcom/sepolicy/test
device/qcom/sepolicy/common \
device/qcom/sepolicy/test \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)
BOARD_SEPOLICY_UNION := \
genfs_contexts \
@@ -34,4 +36,5 @@ BOARD_SEPOLICY_UNION := \
sensors.te \
sensors_test.te \
system_app.te \
thermal-engine.te
thermal-engine.te \
global_macros.te

2
apq8084/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

View File

@@ -1,24 +0,0 @@
type atfwd, domain;
type atfwd_exec, exec_type, file_type;
# Started by init
init_daemon_domain(atfwd)
#============= atfwd ==============
#Set CTL property
allow atfwd ctl_default_prop:property_service set;
#Allow logging
allow atfwd diag_device:chr_file { read write open };
# Talks to init via the property socket.
unix_socket_connect(atfwd, property, init);
# Creates/Talks to qmuxd via the qmux_radio socket.
unix_socket_connect(atfwd, qmux_radio, qmuxd);
allow atfwd qmux_radio_socket:sock_file create;
allow atfwd qmux_radio_socket:dir { write search add_name };
#Allow IPC binding with ServiceManager & System apps
allow atfwd servicemanager:binder call;
allow atfwd system_app:binder call;

24
common/atfwd.te Normal file
View File

@@ -0,0 +1,24 @@
type atfwd, domain;
type atfwd_exec, exec_type, file_type;
# Started by init
#init_daemon_domain(atfwd)
#============= atfwd ==============
#Set CTL property
#allow atfwd ctl_default_prop:property_service set;
#Allow logging
#allow atfwd diag_device:chr_file { read write open };
# Talks to init via the property socket.
#unix_socket_connect(atfwd, property, init);
# Creates/Talks to qmuxd via the qmux_radio socket.
#unix_socket_connect(atfwd, qmux_radio, qmuxd);
#allow atfwd qmux_radio_socket:sock_file create;
#allow atfwd qmux_radio_socket:dir { write search add_name };
#Allow IPC binding with ServiceManager & System apps
#allow atfwd servicemanager:binder call;
#allow atfwd system_app:binder call;

0
common/global_macros.te Normal file
View File

2
mpq8064/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
mpq8092/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8916/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8939/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8960/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8974/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8994/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8x10/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)

2
msm8x26/Android.mk Normal file
View File

@@ -0,0 +1,2 @@
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)