diff --git a/tracking_denials/hal_secure_element_uicc.te b/tracking_denials/hal_secure_element_uicc.te deleted file mode 100644 index 10323849..00000000 --- a/tracking_denials/hal_secure_element_uicc.te +++ /dev/null @@ -1,3 +0,0 @@ -# b/205904403 -dontaudit hal_secure_element_uicc rild:binder { call }; -dontaudit hal_secure_element_uicc rild:binder { transfer }; diff --git a/tracking_denials/rild.te b/tracking_denials/rild.te index 312cca32..cb423e91 100644 --- a/tracking_denials/rild.te +++ b/tracking_denials/rild.te @@ -5,6 +5,5 @@ dontaudit rild vendor_persist_config_default_prop:file { map }; dontaudit rild vendor_persist_config_default_prop:file { open }; dontaudit rild vendor_persist_config_default_prop:file { read }; # b/205904441 -dontaudit rild hal_secure_element_uicc:binder { call }; dontaudit rild vendor_ims_app:binder { call }; dontaudit rild vendor_rcs_app:binder { call }; diff --git a/whitechapel_pro/hal_secure_element_uicc.te b/whitechapel_pro/hal_secure_element_uicc.te index bcc4fac0..c91ae3bb 100644 --- a/whitechapel_pro/hal_secure_element_uicc.te +++ b/whitechapel_pro/hal_secure_element_uicc.te @@ -4,4 +4,8 @@ type hal_secure_element_uicc_exec, exec_type, vendor_file_type, file_type; hal_server_domain(hal_secure_element_uicc, hal_secure_element) init_daemon_domain(hal_secure_element_uicc) +# Allow hal_secure_element_default to access rild +binder_call(hal_secure_element_default, rild); allow hal_secure_element_uicc hal_exynos_rild_hwservice:hwservice_manager find; + + diff --git a/whitechapel_pro/rild.te b/whitechapel_pro/rild.te index c931a996..d30f4a91 100644 --- a/whitechapel_pro/rild.te +++ b/whitechapel_pro/rild.te @@ -19,6 +19,7 @@ binder_call(rild, gpsd) binder_call(rild, hal_audio_default) binder_call(rild, modem_svc_sit) binder_call(rild, oemrilservice_app) +binder_call(rild, hal_secure_element_uicc) # for hal service add_hwservice(rild, hal_exynos_rild_hwservice)