Skip to content
Snippets Groups Projects
Commit 02ed21e8 authored by Roshan Pius's avatar Roshan Pius
Browse files

hal_wifi: Allow system_server to access wifi HIDL services

We're going to be using Android framework directly to invoke Wifi HIDL
calls. So, change permissions appropriately.

Bug: 33398154
Test: Verfied that framework is able to make HIDL calls using
go/aog/310610.

Change-Id: I4d0d88961753ad73f3876aec58b26b89486cc02a
parent 9f1e2b53
No related branches found
No related tags found
No related merge requests found
...@@ -5,8 +5,8 @@ type hal_wifi_exec, exec_type, file_type; ...@@ -5,8 +5,8 @@ type hal_wifi_exec, exec_type, file_type;
## hwbinder access ## hwbinder access
hwbinder_use(hal_wifi) hwbinder_use(hal_wifi)
## call into wificond process (callbacks) ## call into system_server process (for invoking callbacks)
binder_call(hal_wifi, wificond) binder_call(hal_wifi, system_server)
r_dir_file(hal_wifi, proc_net) r_dir_file(hal_wifi, proc_net)
r_dir_file(hal_wifi, sysfs_type) r_dir_file(hal_wifi, sysfs_type)
......
...@@ -146,13 +146,6 @@ allow system_server surfaceflinger:unix_stream_socket { read write setopt }; ...@@ -146,13 +146,6 @@ allow system_server surfaceflinger:unix_stream_socket { read write setopt };
# Perform Binder IPC. # Perform Binder IPC.
binder_use(system_server) binder_use(system_server)
binder_call(system_server, hal_boot)
binder_call(system_server, hal_light)
binder_call(system_server, hal_memtrack)
binder_call(system_server, hal_power)
binder_call(system_server, hal_thermal)
binder_call(system_server, hal_vibrator)
binder_call(system_server, hal_vr)
binder_call(system_server, { appdomain ephemeral_app }) binder_call(system_server, { appdomain ephemeral_app })
binder_call(system_server, binderservicedomain) binder_call(system_server, binderservicedomain)
binder_call(system_server, dumpstate) binder_call(system_server, dumpstate)
...@@ -163,6 +156,18 @@ binder_call(system_server, netd) ...@@ -163,6 +156,18 @@ binder_call(system_server, netd)
binder_call(system_server, wificond) binder_call(system_server, wificond)
binder_service(system_server) binder_service(system_server)
# Perform HwBinder IPC.
hwbinder_use(system_server)
binder_call(system_server, hal_boot)
binder_call(system_server, hal_light)
binder_call(system_server, hal_memtrack)
binder_call(system_server, hal_power)
binder_call(system_server, hal_thermal)
binder_call(system_server, hal_vibrator)
binder_call(system_server, hal_vr)
binder_call(system_server, hal_wifi)
binder_call(system_server, wpa)
# Ask debuggerd to dump backtraces for native stacks of interest. # Ask debuggerd to dump backtraces for native stacks of interest.
# #
# This is derived from the list that system server defines as interesting native processes # This is derived from the list that system server defines as interesting native processes
......
...@@ -5,10 +5,6 @@ type wificond_exec, exec_type, file_type; ...@@ -5,10 +5,6 @@ type wificond_exec, exec_type, file_type;
binder_use(wificond) binder_use(wificond)
binder_call(wificond, system_server) binder_call(wificond, system_server)
hwbinder_use(wificond)
binder_call(wificond, hal_wifi)
binder_call(wificond, wpa)
allow wificond wificond_service:service_manager { add find }; allow wificond wificond_service:service_manager { add find };
# wificond writes firmware paths to this file. # wificond writes firmware paths to this file.
......
...@@ -26,7 +26,7 @@ binder_use(wpa) ...@@ -26,7 +26,7 @@ binder_use(wpa)
# HIDL interface exposed by WPA. # HIDL interface exposed by WPA.
hwbinder_use(wpa) hwbinder_use(wpa)
binder_call(wpa, wificond) binder_call(wpa, system_server)
# Create a socket for receiving info from wpa # Create a socket for receiving info from wpa
allow wpa wpa_socket:dir create_dir_perms; allow wpa wpa_socket:dir create_dir_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment