Skip to content
Snippets Groups Projects
Commit 0555222d authored by Treehugger Robot's avatar Treehugger Robot Committed by Gerrit Code Review
Browse files

Merge "SEPolicy changes for BT SAP hal."

parents 0e9c39d2 c2b594db
No related branches found
No related tags found
No related merge requests found
...@@ -125,6 +125,7 @@ attribute hal_light; ...@@ -125,6 +125,7 @@ attribute hal_light;
attribute hal_memtrack; attribute hal_memtrack;
attribute hal_nfc; attribute hal_nfc;
attribute hal_power; attribute hal_power;
attribute hal_telephony;
attribute hal_thermal; attribute hal_thermal;
attribute hal_vibrator; attribute hal_vibrator;
attribute hal_vr; attribute hal_vr;
......
...@@ -58,6 +58,10 @@ unix_socket_connect(bluetooth, sap_uim, rild) ...@@ -58,6 +58,10 @@ unix_socket_connect(bluetooth, sap_uim, rild)
# /data/data/com.android.shell/files/bugreports/bugreport-*. # /data/data/com.android.shell/files/bugreports/bugreport-*.
allow bluetooth shell_data_file:file read; allow bluetooth shell_data_file:file read;
# Perform HwBinder IPC.
hwbinder_use(bluetooth)
binder_call(bluetooth, hal_telephony)
### ###
### Neverallow rules ### Neverallow rules
### ###
......
# Perform HwBinder IPC.
hwbinder_use(hal_telephony)
binder_call(hal_telephony, radio)
binder_call(hal_telephony, bluetooth)
...@@ -37,6 +37,7 @@ allow radio surfaceflinger_service:service_manager find; ...@@ -37,6 +37,7 @@ allow radio surfaceflinger_service:service_manager find;
allow radio app_api_service:service_manager find; allow radio app_api_service:service_manager find;
allow radio system_api_service:service_manager find; allow radio system_api_service:service_manager find;
# Allow access to hwservicemanager for binderized hal # Perform HwBinder IPC.
binder_call(radio, hwservicemanager) hwbinder_use(radio)
binder_call(radio, rild) binder_call(radio, hal_telephony)
# rild - radio interface layer daemon # rild - radio interface layer daemon
type rild, domain, domain_deprecated; type rild, domain, domain_deprecated, hal_telephony;
type rild_exec, exec_type, file_type; type rild_exec, exec_type, file_type;
net_domain(rild) net_domain(rild)
...@@ -51,6 +51,3 @@ r_dir_file(rild, system_file) ...@@ -51,6 +51,3 @@ r_dir_file(rild, system_file)
# granting the ioctl permission for rild should be device specific # granting the ioctl permission for rild should be device specific
allow rild self:socket create_socket_perms_no_ioctl; allow rild self:socket create_socket_perms_no_ioctl;
# Allow access to hwservicemanager for binderized hal
binder_call(rild, hwservicemanager)
binder_call(rild, radio)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment