Configure SEPolicy to allow PCS to open and use socket connections.
Bug: 299315760 Test: Tested with SEPolicy enforcement on and verified PCS could perform socket operations. Merged-In: Idd9048da4bb3856666698bc0589dbc68aa74fd1a Change-Id: Idd9048da4bb3856666698bc0589dbc68aa74fd1a
This commit is contained in:
parent
66592f6157
commit
5b472c664c
@ -21,3 +21,12 @@ allow vendor_pcs_app hal_pixel_remote_camera_service:service_manager add;
|
|||||||
binder_call(vendor_pcs_app, hal_camera_default);
|
binder_call(vendor_pcs_app, hal_camera_default);
|
||||||
|
|
||||||
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);
|
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);
|
||||||
|
|
||||||
|
# Allow PCS to open socket connections for HTTP streaming support.
|
||||||
|
allow vendor_pcs_app vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||||
|
allow vendor_pcs_app fwmarkd_socket:sock_file write;
|
||||||
|
allow vendor_pcs_app port:tcp_socket name_connect;
|
||||||
|
allow vendor_pcs_app netd:unix_stream_socket connectto;
|
||||||
|
|
||||||
|
allow netd vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||||
|
allow netd vendor_pcs_app:fd use;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user