Skip to content
Snippets Groups Projects
Commit 7f468994 authored by Alex Klyubin's avatar Alex Klyubin
Browse files

Grant rild and gatekeeperd access to hwservicemanager

In my commit f41d89eb I forgot to
switch rild and gatekeeperd rules from explicitly associating these
domains with the hal_telephony and hal_gatekeeper to using the
hal_impl_domain macro. As a result, the recent commit
a2519226 inadvertently revoked
HwBinder access from rild and gatekeeperd.

This commit fixes the issue by switching rild and gatekeeperd to the
hal_impl_domain macro.

Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute haldomain"
      now lists rild and gatekeeperd
Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_telephony"
      still lists rild
Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_gatekeeper"
      still lists gatekeeperd
Bug: 34180936
Bug: 34470443
Change-Id: I7949556f58c36811205d5ea3ee78ea5708e95b45
parent 4eddb3e3
No related branches found
No related tags found
No related merge requests found
type gatekeeperd, domain;
# normally uses HAL; implements HAL in pass-through mode only
type gatekeeperd, hal_gatekeeper, domain;
hal_impl_domain(gatekeeperd, hal_gatekeeper)
type gatekeeperd_exec, exec_type, file_type;
# gatekeeperd
......
# rild - radio interface layer daemon
type rild, domain, domain_deprecated, hal_telephony;
type rild, domain, domain_deprecated;
hal_impl_domain(rild, hal_telephony)
type rild_exec, exec_type, file_type;
net_domain(rild)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment