Merge "Fastboot AIDL Sepolicy changes"
This commit is contained in:
commit
d64fb55474
10 changed files with 23 additions and 0 deletions
|
@ -46,6 +46,7 @@ var (
|
|||
"android.hardware.drm.IDrmFactory/clearkey": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.drm.ICryptoFactory/clearkey": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.dumpstate.IDumpstateDevice/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.fastboot.IFastboot/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.gatekeeper.IGatekeeper/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.gnss.IGnss/default": EXCEPTION_NO_FUZZER,
|
||||
"android.hardware.graphics.allocator.IAllocator/default": EXCEPTION_NO_FUZZER,
|
||||
|
|
|
@ -35,4 +35,5 @@
|
|||
hal_gatekeeper_service
|
||||
hal_broadcastradio_service
|
||||
hal_confirmationui_service
|
||||
hal_fastboot_service
|
||||
))
|
||||
|
|
|
@ -45,6 +45,9 @@ recovery_only(`
|
|||
|
||||
# Needed for reading boot properties.
|
||||
allow fastbootd proc_bootconfig:file r_file_perms;
|
||||
# Let this domain use the hal fastboot service
|
||||
binder_use(fastbootd)
|
||||
hal_client_domain(fastbootd, hal_fastboot)
|
||||
')
|
||||
|
||||
# io_uring_setup needs ipc_lock and permission to operate anon inodes
|
||||
|
|
|
@ -14,6 +14,7 @@ recovery_only(`
|
|||
domain_trans(init, rootfs, hal_bootctl_server)
|
||||
domain_trans(init, rootfs, charger)
|
||||
domain_trans(init, rootfs, fastbootd)
|
||||
domain_trans(init, rootfs, hal_fastboot_server)
|
||||
domain_trans(init, rootfs, hal_health_server)
|
||||
domain_trans(init, rootfs, recovery)
|
||||
domain_trans(init, rootfs, linkerconfig)
|
||||
|
|
|
@ -24,6 +24,7 @@ android.hardware.contexthub.IContextHub/default u:object_r:
|
|||
android.hardware.drm.IDrmFactory/clearkey u:object_r:hal_drm_service:s0
|
||||
android.hardware.drm.ICryptoFactory/clearkey u:object_r:hal_drm_service:s0
|
||||
android.hardware.dumpstate.IDumpstateDevice/default u:object_r:hal_dumpstate_service:s0
|
||||
android.hardware.fastboot.IFastboot/default u:object_r:hal_fastboot_service:s0
|
||||
android.hardware.gnss.IGnss/default u:object_r:hal_gnss_service:s0
|
||||
android.hardware.graphics.allocator.IAllocator/default u:object_r:hal_graphics_allocator_service:s0
|
||||
android.hardware.graphics.composer3.IComposer/default u:object_r:hal_graphics_composer_service:s0
|
||||
|
|
|
@ -338,6 +338,7 @@ hal_attribute(drm);
|
|||
hal_attribute(dumpstate);
|
||||
hal_attribute(evs);
|
||||
hal_attribute(face);
|
||||
hal_attribute(fastboot);
|
||||
hal_attribute(fingerprint);
|
||||
hal_attribute(gatekeeper);
|
||||
hal_attribute(gnss);
|
||||
|
|
|
@ -13,6 +13,7 @@ recovery_only(`
|
|||
# fastbootd can use AIDL HALs in binder mode
|
||||
binder_use(fastbootd)
|
||||
hal_client_domain(fastbootd, hal_health)
|
||||
hal_client_domain(fastbootd, hal_fastboot)
|
||||
|
||||
# Access /dev/usb-ffs/fastbootd/ep0
|
||||
allow fastbootd functionfs:dir search;
|
||||
|
|
7
public/hal_fastboot.te
Normal file
7
public/hal_fastboot.te
Normal file
|
@ -0,0 +1,7 @@
|
|||
# allow binder connection from client to server
|
||||
binder_call(hal_fastboot_client, hal_fastboot_server)
|
||||
# allow client to find the service, allow server to register the service
|
||||
hal_attribute_service(hal_fastboot, hal_fastboot_service)
|
||||
# allow binder communication from server to service_manager
|
||||
binder_call(hal_fastboot_server, servicemanager)
|
||||
|
|
@ -281,6 +281,7 @@ type hal_drm_service, hal_service_type, service_manager_type;
|
|||
type hal_dumpstate_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_evs_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_face_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_fastboot_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_fingerprint_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_gnss_service, protected_service, hal_service_type, service_manager_type;
|
||||
type hal_graphics_allocator_service, hal_service_type, service_manager_type;
|
||||
|
|
6
vendor/hal_fastboot_default.te
vendored
Normal file
6
vendor/hal_fastboot_default.te
vendored
Normal file
|
@ -0,0 +1,6 @@
|
|||
type hal_fastboot_default, domain;
|
||||
|
||||
hal_server_domain(hal_fastboot_default, hal_fastboot)
|
||||
|
||||
type hal_fastboot_default_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(hal_fastboot_default)
|
Loading…
Reference in a new issue