Merge "Configure SEPolicy to allow PCS to open and use socket connections." into udc-qpr-dev-plus-aosp am: 84bd79e5e6
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/24708486 Change-Id: I5f32eea875ee54cd78e9626cc404265a1d401c74 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
commit
554adb78d1
9
camera/sepolicy/vendor/vendor_pcs_app.te
vendored
9
camera/sepolicy/vendor/vendor_pcs_app.te
vendored
@ -8,3 +8,12 @@ allow vendor_pcs_app hal_pixel_remote_camera_service:service_manager add;
|
||||
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);
|
||||
|
||||
binder_call(vendor_pcs_app, hal_camera_default);
|
||||
|
||||
# Allow PCS to open socket connections for HTTP streaming support.
|
||||
allow vendor_pcs_app vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||
allow vendor_pcs_app fwmarkd_socket:sock_file write;
|
||||
allow vendor_pcs_app port:tcp_socket name_connect;
|
||||
allow vendor_pcs_app netd:unix_stream_socket connectto;
|
||||
|
||||
allow netd vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||
allow netd vendor_pcs_app:fd use;
|
||||
|
Loading…
x
Reference in New Issue
Block a user