Skip to content
Snippets Groups Projects
user avatar
Alex Klyubin authored
In my commit f41d89eb I forgot to
switch rild and gatekeeperd rules from explicitly associating these
domains with the hal_telephony and hal_gatekeeper to using the
hal_impl_domain macro. As a result, the recent commit
a2519226 inadvertently revoked
HwBinder access from rild and gatekeeperd.

This commit fixes the issue by switching rild and gatekeeperd to the
hal_impl_domain macro.

Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute haldomain"
      now lists rild and gatekeeperd
Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_telephony"
      still lists rild
Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_gatekeeper"
      still lists gatekeeperd
Bug: 34180936
Bug: 34470443
Change-Id: I7949556f58c36811205d5ea3ee78ea5708e95b45
7f468994
History
Name Last commit Last update
..
adbd.te
app.te
atrace.te
attributes
audioserver.te
binderservicedomain.te
blkid.te
blkid_untrusted.te
bluetooth.te
bluetoothdomain.te
boot_control_hal.te
bootanim.te
bootstat.te
cameraserver.te
charger.te
clatd.te
cppreopts.te
crash_dump.te
device.te
dex2oat.te
dhcp.te
dnsmasq.te
domain.te
domain_deprecated.te
drmserver.te
dumpstate.te
ephemeral_app.te
file.te
fingerprintd.te
fsck.te
fsck_untrusted.te
gatekeeperd.te
global_macros
hal_allocator.te
hal_audio.te
hal_bluetooth.te
hal_boot.te
hal_camera.te
hal_contexthub.te
hal_dumpstate.te
hal_fingerprint.te
hal_gatekeeper.te
hal_gnss.te
hal_graphics_allocator.te
hal_graphics_composer.te
hal_health.te
hal_ir.te
hal_light.te
hal_nfc.te
hal_telephony.te
hal_thermal.te
hal_vibrator.te
hal_vr.te
hal_wifi.te
healthd.te
hostapd.te
hwservicemanager.te
idmap.te
init.te
inputflinger.te
install_recovery.te
installd.te
ioctl_defines
ioctl_macros
isolated_app.te
kernel.te
keystore.te
lmkd.te
logd.te
logpersist.te
mdnsd.te
mediaanalytics.te
mediacodec.te
mediadrmserver.te
mediaextractor.te
mediaserver.te
mtp.te
net.te
netd.te
neverallow_macros
nfc.te
otapreopt_chroot.te
otapreopt_slot.te
perfprofd.te
platform_app.te
postinstall.te
postinstall_dexopt.te
ppp.te
preopt2cachename.te
priv_app.te
profman.te
property.te
racoon.te
radio.te
recovery.te
recovery_persist.te
recovery_refresh.te
rild.te
roles
runas.te