sepolicy: add sepolicy support for fm domain switch
Switch FM app's domain from system to platform app. Add sepolicy rules for fm in platform_app domain. Reomve fm sepolicy rules from system_app domain. CRs-fixed: 2595596 Change-Id: I40a4f68eb8ded948d44653d3bc0209bbb3d9ef35
This commit is contained in:
		
				
					committed by
					
						
						Gerrit - the friendly Code Review server
					
				
			
			
				
	
			
			
			
						parent
						
							6fdd824ccb
						
					
				
				
					commit
					c0d7a5ce1d
				
			
							
								
								
									
										5
									
								
								legacy/vendor/common/platform_app.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										5
									
								
								legacy/vendor/common/platform_app.te
									
									
									
									
										vendored
									
									
								
							@@ -62,3 +62,8 @@ hal_client_domain(platform_app, hal_scve)
 | 
			
		||||
 | 
			
		||||
#allow platform_app to read vendor_mpctl_prop
 | 
			
		||||
get_prop(platform_app, vendor_mpctl_prop)
 | 
			
		||||
#fm
 | 
			
		||||
hal_client_domain(platform_app, hal_fm);
 | 
			
		||||
allow platform_app fm_radio_device:chr_file r_file_perms;
 | 
			
		||||
#allow platform app to access btconfigstore hal
 | 
			
		||||
hal_client_domain(platform_app, hal_btconfigstore);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								legacy/vendor/common/system_app.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								legacy/vendor/common/system_app.te
									
									
									
									
										vendored
									
									
								
							@@ -25,7 +25,6 @@
 | 
			
		||||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 | 
			
		||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 | 
			
		||||
allow system_app fm_radio_device:chr_file r_file_perms;
 | 
			
		||||
r_dir_file(system_app, bluetooth_data_file);
 | 
			
		||||
 | 
			
		||||
allow system_app {
 | 
			
		||||
@@ -175,10 +174,7 @@ hal_client_domain(system_app, hal_soter);
 | 
			
		||||
 | 
			
		||||
get_prop(system_app, vendor_radio_prop)
 | 
			
		||||
 | 
			
		||||
hal_client_domain(system_app, hal_fm);
 | 
			
		||||
 | 
			
		||||
#allow system app to access btconfigstore hal
 | 
			
		||||
hal_client_domain(system_app, hal_btconfigstore);
 | 
			
		||||
 | 
			
		||||
#allow system app to access capabilityconfigstore hal
 | 
			
		||||
hal_client_domain(system_app, hal_capabilityconfigstore_qti);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										6
									
								
								qva/vendor/common/platform_app.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								qva/vendor/common/platform_app.te
									
									
									
									
										vendored
									
									
								
							@@ -40,3 +40,9 @@ hal_client_domain(platform_app, hal_qspmhal)
 | 
			
		||||
hal_client_domain(platform_app, hal_fingerprint)
 | 
			
		||||
# allow platform_app to interact with pasr hal
 | 
			
		||||
hal_client_domain(platform_app, hal_pasrmanager)
 | 
			
		||||
#fm
 | 
			
		||||
hal_client_domain(platform_app, hal_fm);
 | 
			
		||||
# fm_radio app needes  open read on fm_radio_device
 | 
			
		||||
allow platform_app fm_radio_device:chr_file r_file_perms;
 | 
			
		||||
#allow platform_app to access btconfigstore hal
 | 
			
		||||
hal_client_domain(platform_app, hal_btconfigstore);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										6
									
								
								qva/vendor/common/system_app.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								qva/vendor/common/system_app.te
									
									
									
									
										vendored
									
									
								
							@@ -28,10 +28,6 @@
 | 
			
		||||
 | 
			
		||||
#allow system_app access factory
 | 
			
		||||
hal_client_domain(system_app, vendor_hal_factory_qti);
 | 
			
		||||
hal_client_domain(system_app, hal_fm);
 | 
			
		||||
 | 
			
		||||
# fm_radio app needes  open read on fm_radio_device
 | 
			
		||||
allow system_app fm_radio_device:chr_file r_file_perms;
 | 
			
		||||
 | 
			
		||||
#allow system_app access sensorscalibration service
 | 
			
		||||
hal_client_domain(system_app, hal_sensorscalibrate_qti);
 | 
			
		||||
@@ -48,8 +44,6 @@ hal_client_domain(system_app, hal_display_color);
 | 
			
		||||
# allow system_app to interact with light hal
 | 
			
		||||
hal_client_domain(system_app, hal_light);
 | 
			
		||||
 | 
			
		||||
#allow system app to access btconfigstore hal
 | 
			
		||||
hal_client_domain(system_app, hal_btconfigstore);
 | 
			
		||||
 | 
			
		||||
# update engine
 | 
			
		||||
binder_call( system_app, update_engine )
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user