gs-sepolicy(uwb): Allow uwb hal permission to net_admin
This was alloed under gs101-sepolicy. There is an ongoing discussion on how to resolve this for the long term in b/190461440. But, without this uwb functionality is broken on new devices. Bug: 206045367 Bug: 222194886 Change-Id: I6729352f2b7bb93b01990a790e62aa69f60342fe
This commit is contained in:
parent
e42c7120dd
commit
5ddc8be4f4
2 changed files with 2 additions and 1 deletions
|
@ -1,7 +1,6 @@
|
||||||
# b/204718220
|
# b/204718220
|
||||||
dontaudit hal_uwb_vendor_default default_android_service:service_manager { add };
|
dontaudit hal_uwb_vendor_default default_android_service:service_manager { add };
|
||||||
# b/206045367
|
# b/206045367
|
||||||
dontaudit hal_uwb_vendor_default hal_uwb_vendor_default:capability { net_admin };
|
|
||||||
dontaudit hal_uwb_vendor_default zygote:binder { call };
|
dontaudit hal_uwb_vendor_default zygote:binder { call };
|
||||||
dontaudit hal_uwb_vendor_default zygote:binder { transfer };
|
dontaudit hal_uwb_vendor_default zygote:binder { transfer };
|
||||||
# b/208721505
|
# b/208721505
|
||||||
|
|
|
@ -9,6 +9,8 @@ binder_call(hal_uwb_vendor_server, servicemanager)
|
||||||
# allow hal_uwb_vendor to set wpan interfaces up and down
|
# allow hal_uwb_vendor to set wpan interfaces up and down
|
||||||
allow hal_uwb_vendor self:udp_socket create_socket_perms;
|
allow hal_uwb_vendor self:udp_socket create_socket_perms;
|
||||||
allowxperm hal_uwb_vendor self:udp_socket ioctl { SIOCSIFFLAGS SIOCSIFHWADDR SIOCETHTOOL };
|
allowxperm hal_uwb_vendor self:udp_socket ioctl { SIOCSIFFLAGS SIOCSIFHWADDR SIOCETHTOOL };
|
||||||
|
# TODO(b/190461440): Find a long term solution for this.
|
||||||
|
allow hal_uwb_vendor self:global_capability_class_set { net_admin };
|
||||||
|
|
||||||
# allow hal_uwb_vendor to speak to nl802154 in the kernel
|
# allow hal_uwb_vendor to speak to nl802154 in the kernel
|
||||||
allow hal_uwb_vendor self:netlink_generic_socket create_socket_perms_no_ioctl;
|
allow hal_uwb_vendor self:netlink_generic_socket create_socket_perms_no_ioctl;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue