mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
A neverallow asserts that core domains may not access data types
specified in vendor policy. Some violations occured due to policy
granted to both HALs and HAL clients. Some of these violations could
be fixed by modifying the policy such that if a HAL no longer runs in
passthrough mode, then only apply permissions to the HAL itself and
not to clients.
For domains that still violate the neverallow rule, grant a temporary
exemption with TODOs and bugs assigned for the remaining work.
Bug: 34980020
Test: Build and boot Muskie. Make phone call, watch youtube video.
No new denials observed.
Change-Id: I27ec9cdd04d8f5d5524b5b0bcb8c88f9edcc72fb
11 lines
438 B
Plaintext
11 lines
438 B
Plaintext
# Allow wifi hal access to LOWI
|
|
allow hal_wifi_default location:unix_stream_socket connectto;
|
|
allow hal_wifi_default location_data_file:sock_file write;
|
|
|
|
# write to files owned by location daemon
|
|
allow hal_wifi_default location_data_file:dir create_dir_perms;
|
|
allow hal_wifi_default location_data_file:{ file fifo_file } create_file_perms;
|
|
|
|
# Allow wifi hal to read debug info from the driver.
|
|
r_dir_file(hal_wifi_default, proc_wifi_dbg)
|