1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
type cnd, domain, mlstrustedsubject;
type cnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(cnd)
allow cnd self:qipcrtr_socket create_socket_perms_no_ioctl;
r_dir_file(cnd, sysfs_msm_subsys)
r_dir_file(cnd, sysfs_soc)
r_dir_file(cnd, sysfs_ssr)
r_dir_file(cnd, sysfs_esoc)
allow cnd proc_meminfo:file r_file_perms;
set_prop(cnd, cnd_vendor_prop)
# allow cnd to access cnd_data_file
allow cnd cnd_data_file:file create_file_perms;
allow cnd cnd_data_file:dir rw_dir_perms;
# allow cnd to obtain wakelock
wakelock_use(cnd)
# To register cnd to hwbinder
add_hwservice(cnd, hal_datafactory_hwservice)
userdebug_or_eng(`
allow cnd diag_device:chr_file rw_file_perms;
')
# For WFC call(RAT change into IWLAN)
binder_call(cnd, qtidataservices_app)
#for video call
binder_call(cnd, ims)
#communicating with QTI wlan driver for WFC/ VTiWLAN quality
unix_socket_send(cnd, wpa, hal_wifi_supplicant)
allow cnd wpa_data_file:dir w_dir_perms;
allow cnd wpa_data_file:sock_file create_file_perms;
allow cnd self:udp_socket create_socket_perms;
allow cnd self:{
# Allow receiving NETLINK responses from WLAN driver.
netlink_socket
netlink_generic_socket
qipcrtr_socket
} create_socket_perms_no_ioctl;
dontaudit cnd wifi_hal_prop:file r_file_perms;
|