mirror of
https://github.com/Evolution-X-Devices/device_google_gs201
synced 2026-01-27 19:18:35 +00:00
05-22 18:00:40.443 948 948 I auditd : type=1400 audit(0.0:854): avc: denied { write } for comm="radioext@1.0-se" name="property_service" dev="tmpfs" ino=851 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Bug: 343012301
Bug: 203824024
Test: manual test
Flag: EXEMPT bugfix
Change-Id: Ie873e186d3eda618ba832164d9c9713b410977d2
23 lines
871 B
Plaintext
23 lines
871 B
Plaintext
type hal_radioext_default, domain;
|
|
type hal_radioext_default_exec, vendor_file_type, exec_type, file_type;
|
|
init_daemon_domain(hal_radioext_default)
|
|
|
|
hwbinder_use(hal_radioext_default)
|
|
get_prop(hal_radioext_default, hwservicemanager_prop)
|
|
set_prop(hal_radioext_default, vendor_gril_prop)
|
|
add_hwservice(hal_radioext_default, hal_radioext_hwservice)
|
|
|
|
binder_call(hal_radioext_default, grilservice_app)
|
|
binder_call(hal_radioext_default, hal_bluetooth_btlinux)
|
|
|
|
# RW /dev/oem_ipc0
|
|
allow hal_radioext_default radio_device:chr_file rw_file_perms;
|
|
|
|
# RW Freq Config files
|
|
allow hal_radioext_default radio_vendor_data_file:dir create_dir_perms;
|
|
allow hal_radioext_default radio_vendor_data_file:file create_file_perms;
|
|
allow hal_radioext_default sysfs_display:file rw_file_perms;
|
|
|
|
# Bluetooth
|
|
allow hal_radioext_default hal_bluetooth_coexistence_hwservice:hwservice_manager find;
|