avc: denied { call } for scontext=u:r:servicemanager:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0 avc: denied { call } for scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_gnss_default:s0 tclass=binder permissive=0 avc: denied { call } for scontext=u:r:hal_gnss_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0 avc: denied { read } for name="modem_state" dev="sysfs" ino=66325 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 avc: denied { open } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=66325 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 avc: denied { getattr } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=66325 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 Bug: 298924540 Test: No avc deny Change-Id: I77ec1cb171781dd3c671a975a5c049a48d5bcccb
12 lines
No EOL
421 B
Text
12 lines
No EOL
421 B
Text
type hal_gnss_pixel, domain;
|
|
hal_server_domain(hal_gnss_pixel, hal_gnss)
|
|
|
|
type hal_gnss_pixel_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_gnss_pixel)
|
|
|
|
#IPC between pixel and vendor HAL
|
|
binder_call(hal_gnss_pixel, hal_gnss_default)
|
|
binder_call(hal_gnss_default, hal_gnss_pixel)
|
|
|
|
#Read modem state /sys/bus/platform/devices/cpif/modem_state
|
|
allow hal_gnss_pixel sysfs_modem_state:file r_file_perms; |