[ALPS04660543] MDM HIDL change feature

[Detail]
md_monitor will build to vendor image, now it will use HIDL to connect
with JAVA user.

device.mk, SELinux policy about md_monitor need change from system to
vendor, and add relate contents for HILD service.

MDML change:
PlainDataDecoder now need use new constructor with a context, old
constructor will throw an Exception.

For single modem bin:
layout and filter bin file will move from /data/md_mon to
/data/vendor/md_mon. JAVA user shall get layout file via HIDL, then
save a temp file in its cache folder.

For non-single modem bin:
layout file move from /system/etc/mddb/ to /vendor/etc/mddb/, filter bin
file move from /system/etc/firmware/ to /vendor/etc/firmware/. And
system process can access /vendor/etc/. So dont need other change.

MTK-Commit-Id: be91b65d9497e3190ea1127bc71ed2abcb32ed98

Change-Id: I5c99f81c4be7a9f41d3b955156ab3e50ec655d97
CR-Id: ALPS04660543
Feature: Modem Monitor(MDM) Framework
This commit is contained in:
Zhengyu Zhan 2020-01-18 10:15:17 +08:00
parent 509a95b365
commit bd57f96afe
3 changed files with 0 additions and 47 deletions

View File

@ -1,33 +0,0 @@
# ==============================================
# Policy File of /system/bin/md_monitor Executable File
# ==============================================
# Type Declaration
# ==============================================
typeattribute md_monitor coredomain;
typeattribute md_monitor mlstrustedsubject;
# ==============================================
# MTK Policy Rule
# ==============================================
# Date : 2015/10/12
# Operation : IT
# Purpose : Allow md_monitor to set
allow md_monitor ccci_device:chr_file rw_file_perms;
allow md_monitor sysfs_ccci:dir search;
allow md_monitor sysfs_ccci:file r_file_perms;
allow md_monitor file_contexts_file:file r_file_perms;
#allow md_monitor sysfs:file r_file_perms;
# Date : 2017/10/16
# Operation : IT
# Purpose : Allow md_monitor to use restore_image_from_pt()
allow md_monitor block_device:dir search;
allow md_monitor md_block_device:blk_file r_file_perms;
allow md_monitor self:capability { chown };
allow md_monitor storage_file:dir search;
allow md_monitor tmpfs:lnk_file read;

View File

@ -28,7 +28,6 @@ allow system_app mtk_thermal_config_prop:file { getattr open read };
# Package: CAT tool
allow system_app aee_exp_data_file:file r_file_perms;
allow system_app aee_exp_data_file:dir r_dir_perms;
allow system_app md_monitor:unix_stream_socket connectto;
# Date: 2018/11/08
# Operation : JPEG

View File

@ -1,13 +0,0 @@
# ==============================================
# Policy File of /system/bin/md_monitor Executable File
# ==============================================
# Type Declaration
# ==============================================
type md_monitor ,domain;
# ==============================================
# MTK Policy Rule
# ==============================================