75806ef3c5
Ideally, public should only contain APIs (types / attributes) for vendor. The other statements like allow/neverallow/typeattributes are regarded as implementation detail for platform and should be in private. Bug: 232023812 Test: m selinux_policy Test: diff <(git diff --staged | grep "^-" | cut -b2- | sort) \ <(git diff --staged | grep "^+" | cut -b2- | sort) Test: remove comments on plat_sepolicy.cil, replace base_typeattr_* to base_typeattr and then compare old and new plat_sepolicy.cil Change-Id: I5e7d2da4465ab0216de6bacdf03077d37f6ffe12
19 lines
834 B
Text
19 lines
834 B
Text
# HwBinder IPC from client to server, and callbacks
|
|
binder_call(hal_usb_gadget_client, hal_usb_gadget_server)
|
|
binder_call(hal_usb_gadget_server, hal_usb_gadget_client)
|
|
|
|
hal_attribute_service(hal_usb_gadget, hal_usb_gadget_service)
|
|
binder_call(hal_usb_gadget_server, servicemanager)
|
|
|
|
hal_attribute_hwservice(hal_usb_gadget, hal_usb_gadget_hwservice)
|
|
|
|
# Configuring usb gadget functions
|
|
allow hal_usb_gadget_server configfs:lnk_file { read create unlink};
|
|
allow hal_usb_gadget_server configfs:dir rw_dir_perms;
|
|
allow hal_usb_gadget_server configfs:file create_file_perms;
|
|
allow hal_usb_gadget_server functionfs:dir { read search };
|
|
allow hal_usb_gadget_server functionfs:file read;
|
|
allow hal_usb_gadget_server proc_interrupts:file r_file_perms;
|
|
|
|
# Read access to ro.usb.uvc.enabled
|
|
get_prop(hal_usb_gadget_server, usb_uvc_enabled_prop)
|