mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Also add tetheroffload HALs to the manifest.
Bug: 29337859
Bug: 32163131
Test: adb shell getenforce
Enforcing
adb shell dumpsys connectivity tethering
Tethering:
...
Log:
...
06-28 11:46:58.841 - SET master tether settings: ON
06-28 11:46:58.857 - [OffloadController] tethering offload started
And logs show some signs of happiness:
06-28 11:46:58.853 816 947 I IPAHALService: IPACM was provided two FDs (18, 19)
06-28 11:46:58.853 1200 1571 I zygote64: Looking for service android.hardware.tetheroffload.control@1.0::IOffloadControl/default
Change-Id: I40e23c1863901330dfe59e2ea196314c5c7bb52a
(cherry picked from commit c6ecb207d7032bf43e9b39941ff7e47dd127e361)
25 lines
944 B
Plaintext
25 lines
944 B
Plaintext
# associate netdomain to use for accessing internet sockets
|
|
net_domain(hal_tetheroffload_default)
|
|
|
|
userdebug_or_eng(`
|
|
# Allow using the logging file between ipacm and ipacm-diag
|
|
unix_socket_send(hal_tetheroffload_default, ipacm, hal_tetheroffload_default)
|
|
')
|
|
# Allow operations with /dev/ipa, /dev/wwan_ioctl and /dev/ipaNatTable
|
|
allow hal_tetheroffload_default ipa_dev:chr_file rw_file_perms;
|
|
|
|
# Allow receiving NETLINK messages
|
|
allow hal_tetheroffload_default self:{
|
|
netlink_socket
|
|
netlink_generic_socket
|
|
} create_socket_perms_no_ioctl;
|
|
|
|
# Allow creating and modifying the PID file
|
|
allow hal_tetheroffload_default ipa_vendor_data_file:dir w_dir_perms;
|
|
allow hal_tetheroffload_default ipa_vendor_data_file:file create_file_perms;
|
|
|
|
# Register to hwbinder service
|
|
add_hwservice(hal_tetheroffload_default, hal_tetheroffload_hwservice)
|
|
hwbinder_use(hal_tetheroffload_default)
|
|
get_prop(hal_tetheroffload_default, hwservicemanager_prop)
|