Configure SEPolicy to allow PCS to open and use socket connections.
Bug: 299315760 Test: Tested with SEPolicy enforcement on and verified PCS could perform socket operations. Change-Id: Idd9048da4bb3856666698bc0589dbc68aa74fd1a
This commit is contained in:
parent
dc624c5311
commit
5d54c68f6c
9
camera/sepolicy/vendor/vendor_pcs_app.te
vendored
9
camera/sepolicy/vendor/vendor_pcs_app.te
vendored
@ -8,3 +8,12 @@ allow vendor_pcs_app hal_pixel_remote_camera_service:service_manager add;
|
||||
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);
|
||||
|
||||
binder_call(vendor_pcs_app, hal_camera_default);
|
||||
|
||||
# Allow PCS to open socket connections for HTTP streaming support.
|
||||
allow vendor_pcs_app vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||
allow vendor_pcs_app fwmarkd_socket:sock_file write;
|
||||
allow vendor_pcs_app port:tcp_socket name_connect;
|
||||
allow vendor_pcs_app netd:unix_stream_socket connectto;
|
||||
|
||||
allow netd vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
|
||||
allow netd vendor_pcs_app:fd use;
|
||||
|
Loading…
x
Reference in New Issue
Block a user