1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
|
# location - Location daemon
type location, domain, domain_deprecated;
type location_exec, exec_type, file_type;
init_daemon_domain(location)
net_domain(location)
# Socket is created by the daemon, not by init, and under /data/gps,
# not under /dev/socket.
type_transition location location_data_file:sock_file location_socket;
qmux_socket(location)
binder_use(location)
binder_call(location, system_server)
wakelock_use(location)
allow location location_data_file:dir create_dir_perms;
allow location location_data_file:{ file fifo_file } create_file_perms;
allow location location_data_file:sock_file write;
allow location location_exec:file x_file_perms;
allow location location_socket:sock_file create_file_perms;
allow location self:capability { setuid setgid net_admin };
allow location self:{
socket
netlink_socket
netlink_generic_socket
} create_socket_perms;
unix_socket_connect(location, sensors, sensors)
allow location sensors_device:chr_file r_file_perms;
allow location sensors_socket:sock_file rw_file_perms;
allow location shell_exec:file rx_file_perms;
allow location system_server:unix_stream_socket { read write connectto};
# For interfacing with the device sensorservice
# permission check for slim daemon
allow location { sensorservice_service permission_service }:service_manager find;
allow location sensors_persist_file:dir r_dir_perms;
allow location sensors_persist_file:file r_file_perms;
#wifi
userdebug_or_eng(`
allow location wifi_data_file:dir create_dir_perms;
allow location wifi_data_file:sock_file create_file_perms;
allow location su:unix_dgram_socket sendto;
')
unix_socket_send(wpa, location, location)
allow location wpa:unix_dgram_socket sendto;
allow location wpa_socket:dir rw_dir_perms;
allow location wpa_socket:sock_file create_file_perms;
allow location rfs_shared_hlos_file:dir r_dir_perms;
allow location rfs_shared_hlos_file:file rw_file_perms;
dontaudit location domain:dir r_dir_perms;
r_dir_file(location, netmgrd)
allow location persist_file:dir r_dir_perms;
#Allow access to netmgrd socket
netmgr_socket(location);
#Allow access to properties
set_prop(location, location_prop);
#diag
userdebug_or_eng(`
diag_use(location)
')
|