Files
device_google_wahoo/sepolicy/vendor/hal_tetheroffload_default.te
Jeff Vander Stoep 5c5eb9de3a declare ipacm as the tetheroffload HAL
Also add tetheroffload HALs to the manifest.

Bug: 29337859
Bug: 32163131

Test: adb shell getenforce
Enforcing
adb shell dumpsys connectivity tethering
Tethering:
  ...
  Log:
    ...
    06-28 11:46:58.841 - SET master tether settings: ON
    06-28 11:46:58.857 - [OffloadController] tethering offload started
And logs show some signs of happiness:
    06-28 11:46:58.853   816   947 I IPAHALService: IPACM was provided two FDs (18, 19)
    06-28 11:46:58.853  1200  1571 I zygote64: Looking for service android.hardware.tetheroffload.control@1.0::IOffloadControl/default
Change-Id: I40e23c1863901330dfe59e2ea196314c5c7bb52a
(cherry picked from commit c6ecb207d7032bf43e9b39941ff7e47dd127e361)
2017-06-29 04:25:14 +00:00

25 lines
944 B
Plaintext

# associate netdomain to use for accessing internet sockets
net_domain(hal_tetheroffload_default)
userdebug_or_eng(`
# Allow using the logging file between ipacm and ipacm-diag
unix_socket_send(hal_tetheroffload_default, ipacm, hal_tetheroffload_default)
')
# Allow operations with /dev/ipa, /dev/wwan_ioctl and /dev/ipaNatTable
allow hal_tetheroffload_default ipa_dev:chr_file rw_file_perms;
# Allow receiving NETLINK messages
allow hal_tetheroffload_default self:{
netlink_socket
netlink_generic_socket
} create_socket_perms_no_ioctl;
# Allow creating and modifying the PID file
allow hal_tetheroffload_default ipa_vendor_data_file:dir w_dir_perms;
allow hal_tetheroffload_default ipa_vendor_data_file:file create_file_perms;
# Register to hwbinder service
add_hwservice(hal_tetheroffload_default, hal_tetheroffload_hwservice)
hwbinder_use(hal_tetheroffload_default)
get_prop(hal_tetheroffload_default, hwservicemanager_prop)