| # Copyright (c) 2018-2020, The Linux Foundation. All rights reserved. |
| # |
| # Redistribution and use in source and binary forms, with or without |
| # modification, are permitted provided that the following conditions are |
| # met: |
| # * Redistributions of source code must retain the above copyright |
| # notice, this list of conditions and the following disclaimer. |
| # * Redistributions in binary form must reproduce the above |
| # copyright notice, this list of conditions and the following |
| # disclaimer in the documentation and/or other materials provided |
| # with the distribution. |
| # * Neither the name of The Linux Foundation nor the names of its |
| # contributors may be used to endorse or promote products derived |
| # from this software without specific prior written permission. |
| # |
| # THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED |
| # WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT |
| # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS |
| # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
| # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
| # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
| # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN |
| # IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| |
| # generic/vendor/common/location.te - sepolicy rules for generic location module - loc_launcher |
| |
| # loc_launcher service |
| # which launches various other services supporting GPS & Wifi-RTT (LOWI) vendor_location |
| type vendor_location, domain; |
| type vendor_location_exec, exec_type, vendor_file_type, file_type; |
| |
| init_daemon_domain(vendor_location) |
| |
| allow vendor_location self:capability { setgid setuid }; |
| |
| # execute permission for vendor_location daemons in /vendor/bin/ |
| allow vendor_location vendor_location_exec:file rx_file_perms; |
| |
| # /data/vendor/vendor_location |
| allow vendor_location vendor_location_data_file:dir create_dir_perms; |
| allow vendor_location vendor_location_data_file:file create_file_perms; |
| |
| # /dev/socket/vendor_location |
| allow vendor_location vendor_location_socket: {sock_file lnk_file } create_file_perms; |
| allow vendor_location vendor_location_socket:dir rw_dir_perms; |
| |
| # allow socket communication with gnss hal |
| allow vendor_location vendor_hal_gnss_qti:unix_dgram_socket sendto; |
| |
| # IPC loc_mq_clnt to /dev/socket/location/mq/LOWI-SERVER |
| allow vendor_location vendor_location_lowi_server:unix_dgram_socket sendto; |
| |
| # permission for read execute vendor_location daemons in userdebug mode. |
| userdebug_or_eng(` |
| allow shell vendor_location_exec:file rx_file_perms; |
| ') |
| |
| # stop or kill loc_launcher, it will send signal Sigkill or Sigstop to child processes. |
| userdebug_or_eng(` |
| allow vendor_location {vendor_location_xtra_daemon vendor_location_lowi_server}:process { signal sigkill sigstop }; |
| ') |
| |
| dontaudit vendor_location kernel:system module_request; |