Revert "qcom: qrtr: Disable qrtr-ns and qrtr-cfg" am: ac5ab76ae1

Original change: https://android-review.googlesource.com/c/device/linaro/dragonboard/+/1359342

Change-Id: I1f7335a6c150b8cf892ef8969a082c24dfe1322d
diff --git a/db845c/device.mk b/db845c/device.mk
index 23299ad..b37e06f 100644
--- a/db845c/device.mk
+++ b/db845c/device.mk
@@ -32,9 +32,10 @@
 # Build generic Audio HAL
 PRODUCT_PACKAGES := audio.primary.db845c
 
-# Build and install Qcom userspace tools to talk to dsp and modem
 PRODUCT_PACKAGES += \
     pd-mapper \
+    qrtr-ns \
+    qrtr-cfg \
     qrtr-lookup \
     rmtfs \
     tqftpserv
diff --git a/qcom/init.qcom.rc b/qcom/init.qcom.rc
index ba4f24c..94e9038 100644
--- a/qcom/init.qcom.rc
+++ b/qcom/init.qcom.rc
@@ -1,3 +1,10 @@
+service qrtr-ns /vendor/bin/qrtr-ns -f 1
+    class core
+    user root
+    group system
+    disabled
+    oneshot
+
 service pd_mapper /vendor/bin/pd-mapper
     class core
     user root
@@ -19,6 +26,10 @@
     disabled
     oneshot
 
+on early-init
+    exec - root -- /vendor/bin/qrtr-cfg 1
+    start qrtr-ns
+
 on post-fs
     start pd_mapper
     exec - root -- /system/bin/sleep 1
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts
index f223cc4..d16f3fc 100644
--- a/sepolicy/file_contexts
+++ b/sepolicy/file_contexts
@@ -31,6 +31,8 @@
 
 /vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service\.software			u:object_r:hal_gatekeeper_default_exec:s0
 /vendor/bin/pd-mapper									u:object_r:pd_mapper_exec:s0
+/vendor/bin/qrtr-cfg									u:object_r:qrtr_exec:s0
+/vendor/bin/qrtr-ns									u:object_r:qrtr_exec:s0
 /vendor/bin/rmtfs									u:object_r:rmtfs_exec:s0
 /vendor/bin/tqftpserv									u:object_r:tqftpserv_exec:s0
 
@@ -40,3 +42,4 @@
 /vendor/lib(64)?/libdrm_freedreno\.so							u:object_r:same_process_hal_file:s0
 /vendor/lib(64)?/libgbm\.so								u:object_r:same_process_hal_file:s0
 /vendor/lib(64)?/libglapi\.so								u:object_r:same_process_hal_file:s0
+/vendor/lib(64)?/libqrtr\.so								u:object_r:same_process_hal_file:s0
diff --git a/sepolicy/qrtr.te b/sepolicy/qrtr.te
new file mode 100644
index 0000000..8344398
--- /dev/null
+++ b/sepolicy/qrtr.te
@@ -0,0 +1,8 @@
+type qrtr, domain;
+type qrtr_exec, exec_type, vendor_file_type, file_type;
+init_daemon_domain(qrtr)
+
+allow qrtr self:capability net_admin;
+allow qrtr self:capability sys_admin;
+allow qrtr self:qipcrtr_socket create_socket_perms_no_ioctl;
+allow qrtr self:netlink_route_socket { create nlmsg_write read write };