Files
android_device_qcom_sepolicy/common/netd.te
Deepak Kushwah f9d0b75cf5 wfd : Changes for Secure WFD And
Direct Streaming

      -- HDCP library are now pushed into /vendor/lib.
      -- Newly created hal service needs permission to
         read firmware , ion and tee devices.
      -- New service also needs permission to access tcp_socket
      -- Adding rules for wfd.native.mm.service
      -- service is part of vendor and used for direct streaming
         functionality for WFD

Change-Id: I99db7506399b2d9041007c5ef52087d1cca6ca89
2017-08-22 00:20:44 +05:30

34 lines
1.1 KiB
Plaintext

#Policies for IPv6 tethering
allow netd netd:capability { setgid setuid };
dontaudit netd self:capability sys_module;
binder_use(netd);
allow netd qtitetherservice_service:service_manager find;
allow netd netd:packet_socket create_socket_perms_no_ioctl;
#unix_socket_connect(netd, cnd, cnd)
allow netd wfdservice:fd use;
#allow netd wfdservice:tcp_socket rw_socket_perms;
hal_client_domain(netd, wifidisplayhalservice);
# allow to read /data/misc/ipa/tether_stats file
allow netd ipacm_data_file:dir r_dir_perms;
allow netd ipacm_data_file:file r_file_perms;
#allow netd to use privileged sock ioctls
allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls;
# needed for netd to start FST Manager via system property
allow netd netd_prop:property_service set;
allow netd self:capability fsetid;
#allow netd hostapd:unix_dgram_socket sendto;
# Allow netd to chmod dir /data/misc/dhcp
allow netd dhcp_data_file:dir create_dir_perms;
type_transition netd wifi_data_file:dir wpa_socket "sockets";
allow netd wpa_socket:dir create_dir_perms;
#allow netd wpa_socket:sock_file create_file_perms;