Merge "Update SEPolicy for Tetheroffload AIDL"
This commit is contained in:
commit
b8194ca7fb
6 changed files with 8 additions and 0 deletions
|
@ -116,6 +116,7 @@ var (
|
|||
"android.hardware.security.sharedsecret.ISharedSecret/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.sensors.ISensors/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.soundtrigger3.ISoundTriggerHw/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.tetheroffload.IOffload/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.thermal.IThermal/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.tv.hdmi.cec.IHdmiCec/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.tv.hdmi.connection.IHdmiConnection/default": EXCEPTION_NO_FUZZER,
|
||||
|
|
|
@ -21,6 +21,7 @@
|
|||
hal_cas_service
|
||||
hal_remoteaccess_service
|
||||
hal_secure_element_service
|
||||
hal_tetheroffload_service
|
||||
hal_thermal_service
|
||||
hal_usb_gadget_service
|
||||
hal_tv_input_service
|
||||
|
|
|
@ -91,6 +91,7 @@ android.hardware.security.secureclock.ISecureClock/default u:object_
|
|||
android.hardware.security.sharedsecret.ISharedSecret/default u:object_r:hal_sharedsecret_service:s0
|
||||
android.hardware.sensors.ISensors/default u:object_r:hal_sensors_service:s0
|
||||
android.hardware.soundtrigger3.ISoundTriggerHw/default u:object_r:hal_audio_service:s0
|
||||
android.hardware.tetheroffload.IOffload/default u:object_r:hal_tetheroffload_service:s0
|
||||
android.hardware.thermal.IThermal/default u:object_r:hal_thermal_service:s0
|
||||
android.hardware.tv.hdmi.cec.IHdmiCec/default u:object_r:hal_tv_hdmi_cec_service:s0
|
||||
android.hardware.tv.hdmi.connection.IHdmiConnection/default u:object_r:hal_tv_hdmi_connection_service:s0
|
||||
|
|
|
@ -3,6 +3,9 @@ binder_call(hal_tetheroffload_client, hal_tetheroffload_server)
|
|||
binder_call(hal_tetheroffload_server, hal_tetheroffload_client)
|
||||
|
||||
hal_attribute_hwservice(hal_tetheroffload, hal_tetheroffload_hwservice)
|
||||
hal_attribute_service(hal_tetheroffload, hal_tetheroffload_service)
|
||||
|
||||
binder_use(hal_tetheroffload_server)
|
||||
|
||||
# allow the client to pass the server already open netlink sockets
|
||||
allow hal_tetheroffload_server hal_tetheroffload_client:netlink_netfilter_socket { getattr read setopt write };
|
||||
|
|
|
@ -314,6 +314,7 @@ type hal_secureclock_service, protected_service, hal_service_type, service_manag
|
|||
type hal_secure_element_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_sharedsecret_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_system_suspend_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_tetheroffload_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_thermal_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_tv_hdmi_cec_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_tv_hdmi_connection_service, protected_service, hal_service_type, service_manager_type;
|
||||
|
|
1
vendor/file_contexts
vendored
1
vendor/file_contexts
vendored
|
@ -96,6 +96,7 @@
|
|||
/(vendor|system/vendor)/bin/hw/android\.hardware\.security\.dice-service\.non-secure-software u:object_r:hal_dice_default_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.security\.keymint-service u:object_r:hal_keymint_default_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/rild u:object_r:rild_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.tetheroffload-service\.example u:object_r:hal_tetheroffload_default_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.thermal@1\.[01]-service u:object_r:hal_thermal_default_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.thermal-service\.example u:object_r:hal_thermal_default_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.tv\.cec@1\.[01]-service u:object_r:hal_tv_cec_default_exec:s0
|
||||
|
|
Loading…
Reference in a new issue