Direct Streaming
      -- HDCP library are now pushed into /vendor/lib.
      -- Newly created hal service needs permission to
         read firmware , ion and tee devices.
      -- New service also needs permission to access tcp_socket
      -- Adding rules for wfd.native.mm.service
      -- service is part of vendor and used for direct streaming
         functionality for WFD
Change-Id: I99db7506399b2d9041007c5ef52087d1cca6ca89
		
	
		
			
				
	
	
		
			34 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			34 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
#Policies for IPv6 tethering
 | 
						|
allow netd netd:capability { setgid setuid };
 | 
						|
dontaudit netd self:capability sys_module;
 | 
						|
binder_use(netd);
 | 
						|
allow netd qtitetherservice_service:service_manager find;
 | 
						|
 | 
						|
allow netd netd:packet_socket create_socket_perms_no_ioctl;
 | 
						|
 | 
						|
#unix_socket_connect(netd, cnd, cnd)
 | 
						|
 | 
						|
allow netd wfdservice:fd use;
 | 
						|
#allow netd wfdservice:tcp_socket rw_socket_perms;
 | 
						|
hal_client_domain(netd, wifidisplayhalservice);
 | 
						|
 | 
						|
# allow to read /data/misc/ipa/tether_stats file
 | 
						|
allow netd ipacm_data_file:dir r_dir_perms;
 | 
						|
allow netd ipacm_data_file:file r_file_perms;
 | 
						|
 | 
						|
#allow netd to use privileged sock ioctls
 | 
						|
allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls;
 | 
						|
 | 
						|
# needed for netd to start FST Manager via system property
 | 
						|
allow netd netd_prop:property_service set;
 | 
						|
 | 
						|
allow netd self:capability fsetid;
 | 
						|
#allow netd hostapd:unix_dgram_socket sendto;
 | 
						|
 | 
						|
# Allow netd to chmod dir /data/misc/dhcp
 | 
						|
allow netd dhcp_data_file:dir create_dir_perms;
 | 
						|
 | 
						|
type_transition netd wifi_data_file:dir wpa_socket "sockets";
 | 
						|
allow netd wpa_socket:dir create_dir_perms;
 | 
						|
#allow netd wpa_socket:sock_file create_file_perms;
 |