device_google_zuma/sepolicy/radio/hal_radioext_default.te
Michael Bestas d97db5601b Android 15.0.0 Release 6 (AP4A.241205.013)
-----BEGIN PGP SIGNATURE-----
 
 iFwEABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
 eMmQAJj8v6hZUtdtQwD+swBc8Ai58HICAJ9XVGRsPwZXj4SxZGaw88jxJvza7A==
 =Sdzw
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY75kXHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmnfBBAAtQKkIYEyBoGodGbDN1Edq19Z
 +FQEGwR51+LN5hLV4WElrLfkSbm3rhA44Zw7mu/SoohS+gaJC08jJltvXsABarCM
 pdl6Ng6dhmUXJ27cAjQF3PdZd8qQ0rMDZwfbByHrl0t6T78pWbn+WECw2Yr/gNyn
 FOaGXSuZMAyXAs4xh5Ctx7dW+gQRWx+qlhdl/ZaH+R0ac2tkxLjHJHNk4vAdu+N/
 gCV1B52q2rZLTLBBrptWgEJ05r504z/H+fycUZrccMA5dhbcRtUBq05RPKbwOFVJ
 wXa+B91V818x5XcDW7pxfh6DyL4uqWwaEf4/rtHNjlVx44vC1CETvO1i87KtaJVq
 QvA45oMwIhQZM7SZWqBHHm+GQ2e7wSxAC5UEJwheQLi7y2Xe3nLL1gPW9ddduVKj
 Sdw+Ofis9hjx+/IhYDCnpy+81pMzXKrNnMZrQlc2VQJ2hXz83nyvyiVCjhqROgQh
 7bZoNpJWoaba5vdsZ+sdZVX8DPGE+r70Hx96dAMm0mp2ceGZzn8bBEMnang5m8SW
 sHdlb2KLW2CxDk8Oxpl07Ne36nmmhwO73XBvh7x43gvTN2jcFZ4J9dYwTlLSAfOr
 /1hGJGpvRaAfvlO2wAjooOfjf3ZzEa7HnfkLpf+h02bc8q8lQy6Y6Wc3foOCBG0y
 2XEcxXB4Mhh57TabN/o=
 =IhLY
 -----END PGP SIGNATURE-----

Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6

Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iFwEABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eMmQAJj8v6hZUtdtQwD+swBc8Ai58HICAJ9XVGRsPwZXj4SxZGaw88jxJvza7A==
# =Sdzw
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Daniel Chapin (3) and others
# Via Android Build Coastguard Worker (30) and others
* tag 'android-15.0.0_r6': (32 commits)
  Make android.framework.stats-v2-ndk app reachable
  Update SELinux error
  Change vendor_fingerprint_prop to vendor_restricted_prop
  Update SELinux error
  storage: move storage related device type to common folder
  Update SELinux error
  Revert^2 "Add udc sysfs to udc_sysfs fs context"
  Label sysfs node power_mode as sysfs_display.
  Revert^2 "zuma: update modem_svc sepolicy for UMI"
  Revert "zuma: update modem_svc sepolicy for UMI"
  Update SELinux error
  zuma: update modem_svc sepolicy for UMI
  Revert "trusty: storageproxy: add fs_ready_rw property context"
  DisplayPort Stats: add sysfs access permission on Zuma devices
  Revert "trusty: storageproxy: add fs_ready_rw property context"
  Revert "trusty: storageproxy: add fs_ready_rw property context"
  Correct the path of tcpm-source-psy device
  add hal_graphics_composer to access thermal temperature
  Revert "Add udc sysfs to udc_sysfs fs context"
  Add udc sysfs to udc_sysfs fs context
  ...

Change-Id: I0f827d7ab63b0cea6e3dfd3c3d28b03f53673a1e
2024-12-11 03:49:13 +02:00

29 lines
1.1 KiB
Text

type hal_radioext_default, domain;
type hal_radioext_default_exec, vendor_file_type, exec_type, file_type;
init_daemon_domain(hal_radioext_default)
hwbinder_use(hal_radioext_default)
get_prop(hal_radioext_default, hwservicemanager_prop)
set_prop(hal_radioext_default, vendor_gril_prop)
add_hwservice(hal_radioext_default, hal_radioext_hwservice)
binder_call(hal_radioext_default, servicemanager)
binder_call(hal_radioext_default, grilservice_app)
binder_call(hal_radioext_default, hal_bluetooth_btlinux)
# RW /dev/oem_ipc0
allow hal_radioext_default radio_device:chr_file rw_file_perms;
# RW MIPI Freq files
allow hal_radioext_default radio_vendor_data_file:dir create_dir_perms;
allow hal_radioext_default radio_vendor_data_file:file create_file_perms;
# Bluetooth
allow hal_radioext_default hal_bluetooth_coexistence_hwservice:hwservice_manager find;
allow hal_radioext_default hal_bluetooth_coexistence_service:service_manager find;
# Twoshay
binder_use(hal_radioext_default)
allow hal_radioext_default gril_antenna_tuning_service:service_manager find;
binder_call(hal_radioext_default, gril_antenna_tuning_service)
binder_call(hal_radioext_default, twoshay)