Skip to content
Snippets Groups Projects
Commit 910f63f9 authored by TreeHugger Robot's avatar TreeHugger Robot Committed by Android (Google) Code Review
Browse files

Merge "Move rild from public to vendor." into pi-dev

parents 37925fdb eeda6c61
No related branches found
No related tags found
No related merge requests found
...@@ -12,6 +12,7 @@ ...@@ -12,6 +12,7 @@
(type tracing_shell_writable_debug) (type tracing_shell_writable_debug)
(type vold_socket) (type vold_socket)
(type webview_zygote_socket) (type webview_zygote_socket)
(type rild)
(typeattributeset accessibility_service_26_0 (accessibility_service)) (typeattributeset accessibility_service_26_0 (accessibility_service))
(typeattributeset account_service_26_0 (account_service)) (typeattributeset account_service_26_0 (account_service))
......
...@@ -2,6 +2,7 @@ ...@@ -2,6 +2,7 @@
(type webview_zygote_socket) (type webview_zygote_socket)
(type reboot_data_file) (type reboot_data_file)
(type vold_socket) (type vold_socket)
(type rild)
(expandtypeattribute (accessibility_service_27_0) true) (expandtypeattribute (accessibility_service_27_0) true)
(expandtypeattribute (account_service_27_0) true) (expandtypeattribute (account_service_27_0) true)
......
...@@ -961,7 +961,6 @@ full_treble_only(` ...@@ -961,7 +961,6 @@ full_treble_only(`
domain domain
-coredomain -coredomain
-appdomain -appdomain
-rild
-vendor_executes_system_violators -vendor_executes_system_violators
-vendor_init -vendor_init
} { } {
......
...@@ -6,7 +6,7 @@ neverallow { ...@@ -6,7 +6,7 @@ neverallow {
-hal_wifi_server -hal_wifi_server
-hal_wifi_hostapd_server -hal_wifi_hostapd_server
-hal_wifi_supplicant_server -hal_wifi_supplicant_server
-rild -hal_telephony_server
} self:global_capability_class_set { net_admin net_raw }; } self:global_capability_class_set { net_admin net_raw };
# Unless a HAL's job is to communicate over the network, or control network # Unless a HAL's job is to communicate over the network, or control network
...@@ -17,7 +17,7 @@ neverallow { ...@@ -17,7 +17,7 @@ neverallow {
-hal_wifi_server -hal_wifi_server
-hal_wifi_hostapd_server -hal_wifi_hostapd_server
-hal_wifi_supplicant_server -hal_wifi_supplicant_server
-rild -hal_telephony_server
} domain:{ tcp_socket udp_socket rawip_socket } *; } domain:{ tcp_socket udp_socket rawip_socket } *;
### ###
...@@ -44,7 +44,7 @@ neverallow { ...@@ -44,7 +44,7 @@ neverallow {
neverallow { neverallow {
halserverdomain halserverdomain
-hal_dumpstate_server -hal_dumpstate_server
-rild -hal_telephony_server
} { file_type fs_type }:file execute_no_trans; } { file_type fs_type }:file execute_no_trans;
# Do not allow a process other than init to transition into a HAL domain. # Do not allow a process other than init to transition into a HAL domain.
neverallow { domain -init } halserverdomain:process transition; neverallow { domain -init } halserverdomain:process transition;
......
...@@ -5,3 +5,42 @@ binder_call(hal_telephony_server, hal_telephony_client) ...@@ -5,3 +5,42 @@ binder_call(hal_telephony_server, hal_telephony_client)
add_hwservice(hal_telephony_server, hal_telephony_hwservice) add_hwservice(hal_telephony_server, hal_telephony_hwservice)
allow hal_telephony_client hal_telephony_hwservice:hwservice_manager find; allow hal_telephony_client hal_telephony_hwservice:hwservice_manager find;
allowxperm hal_telephony_server self:udp_socket ioctl priv_sock_ioctls;
allow hal_telephony_server self:netlink_route_socket nlmsg_write;
allow hal_telephony_server kernel:system module_request;
allow hal_telephony_server self:global_capability_class_set { setpcap setgid setuid net_admin net_raw };
allow hal_telephony_server alarm_device:chr_file rw_file_perms;
allow hal_telephony_server cgroup:dir create_dir_perms;
allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
allow hal_telephony_server radio_device:chr_file rw_file_perms;
allow hal_telephony_server radio_device:blk_file r_file_perms;
allow hal_telephony_server mtd_device:dir search;
allow hal_telephony_server efs_file:dir create_dir_perms;
allow hal_telephony_server efs_file:file create_file_perms;
allow hal_telephony_server vendor_shell_exec:file rx_file_perms;
allow hal_telephony_server bluetooth_efs_file:file r_file_perms;
allow hal_telephony_server bluetooth_efs_file:dir r_dir_perms;
allow hal_telephony_server sdcard_type:dir r_dir_perms;
# property service
set_prop(hal_telephony_server, radio_prop)
set_prop(hal_telephony_server, exported_radio_prop)
set_prop(hal_telephony_server, exported2_radio_prop)
allow hal_telephony_server tty_device:chr_file rw_file_perms;
# Allow hal_telephony_server to create and use netlink sockets.
allow hal_telephony_server self:netlink_socket create_socket_perms_no_ioctl;
allow hal_telephony_server self:netlink_generic_socket create_socket_perms_no_ioctl;
allow hal_telephony_server self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
# Access to wake locks
wakelock_use(hal_telephony_server)
r_dir_file(hal_telephony_server, proc_net)
r_dir_file(hal_telephony_server, sysfs_type)
r_dir_file(hal_telephony_server, system_file)
# granting the ioctl permission for hal_telephony_server should be device specific
allow hal_telephony_server self:socket create_socket_perms_no_ioctl;
...@@ -158,7 +158,7 @@ compatible_property_only(` ...@@ -158,7 +158,7 @@ compatible_property_only(`
domain domain
-coredomain -coredomain
-appdomain -appdomain
-rild -hal_telephony_server
-vendor_init -vendor_init
} { } {
exported_radio_prop exported_radio_prop
...@@ -203,7 +203,7 @@ compatible_property_only(` ...@@ -203,7 +203,7 @@ compatible_property_only(`
domain domain
-coredomain -coredomain
-appdomain -appdomain
-rild -hal_telephony_server
-vendor_init -vendor_init
} { } {
radio_prop radio_prop
......
...@@ -5,8 +5,8 @@ net_domain(radio) ...@@ -5,8 +5,8 @@ net_domain(radio)
bluetooth_domain(radio) bluetooth_domain(radio)
binder_service(radio) binder_service(radio)
# Talks to rild via the rild socket only for devices without full treble # Talks to hal_telephony_server via the rild socket only for devices without full treble
not_full_treble(`unix_socket_connect(radio, rild, rild)') not_full_treble(`unix_socket_connect(radio, rild, hal_telephony_server)')
# Data file accesses. # Data file accesses.
allow radio radio_data_file:dir create_dir_perms; allow radio radio_data_file:dir create_dir_perms;
......
# rild - radio interface layer daemon
type rild, domain;
hal_server_domain(rild, hal_telephony)
net_domain(rild)
allowxperm rild self:udp_socket ioctl priv_sock_ioctls;
allow rild self:netlink_route_socket nlmsg_write;
allow rild kernel:system module_request;
allow rild self:global_capability_class_set { setpcap setgid setuid net_admin net_raw };
allow rild alarm_device:chr_file rw_file_perms;
allow rild cgroup:dir create_dir_perms;
allow rild cgroup:{ file lnk_file } r_file_perms;
allow rild radio_device:chr_file rw_file_perms;
allow rild radio_device:blk_file r_file_perms;
allow rild mtd_device:dir search;
allow rild efs_file:dir create_dir_perms;
allow rild efs_file:file create_file_perms;
allow rild shell_exec:file rx_file_perms;
allow rild bluetooth_efs_file:file r_file_perms;
allow rild bluetooth_efs_file:dir r_dir_perms;
allow rild sdcard_type:dir r_dir_perms;
# property service
set_prop(rild, radio_prop)
set_prop(rild, exported_radio_prop)
set_prop(rild, exported2_radio_prop)
allow rild tty_device:chr_file rw_file_perms;
# Allow rild to create and use netlink sockets.
allow rild self:netlink_socket create_socket_perms_no_ioctl;
allow rild self:netlink_generic_socket create_socket_perms_no_ioctl;
allow rild self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
# Access to wake locks
wakelock_use(rild)
r_dir_file(rild, proc_net)
r_dir_file(rild, sysfs_type)
r_dir_file(rild, system_file)
# granting the ioctl permission for rild should be device specific
allow rild self:socket create_socket_perms_no_ioctl;
# rild - radio interface layer daemon
type rild, domain;
hal_server_domain(rild, hal_telephony)
net_domain(rild)
# type_transition must be private policy the domain_trans rules could stay # type_transition must be private policy the domain_trans rules could stay
# public, but conceptually should go with this # public, but conceptually should go with this
type rild_exec, exec_type, vendor_file_type, file_type; type rild_exec, exec_type, vendor_file_type, file_type;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment