1 type wcnss_service, domain; 2 type wcnss_service_exec, exec_type, vendor_file_type, file_type; 3 4 init_daemon_domain(wcnss_service) 5 net_domain(wcnss_service) 6 7 vndbinder_use(wcnss_service) 8 binder_call(wcnss_service, per_mgr) 9 10 allow wcnss_service per_mgr_service:service_manager find; 11 12 allow wcnss_service vendor_shell_exec:file rx_file_perms; 13 allow wcnss_service vendor_toolbox_exec:file rx_file_perms; 14 15 16 allow wcnss_service self:socket create_socket_perms; 17 allowxperm wcnss_service self:socket ioctl msm_sock_ipc_ioctls; 18 allowxperm wcnss_service self:udp_socket ioctl { SIOCIWFIRSTPRIV_05 SIOCSIFFLAGS }; 19 allow wcnss_service self:netlink_generic_socket create_socket_perms_no_ioctl; 20 allow wcnss_service self:netlink_socket create_socket_perms_no_ioctl; 21 22 allow wcnss_service cnss_vendor_data_file:dir create_dir_perms; 23 allow wcnss_service cnss_vendor_data_file:file create_file_perms; 24 25 r_dir_file(wcnss_service, sysfs_msm_subsys) 26 # pkt logging for cnss_diag 27 userdebug_or_eng(` 28 allow wcnss_service wifi_vendor_log_data_file:dir create_dir_perms; 29 allow wcnss_service wifi_vendor_log_data_file:file create_file_perms; 30 r_dir_file(wcnss_service, proc_wifi_dbg) 31 ') 32 33 allow wcnss_service sysfs_soc:dir search; 34 allow wcnss_service sysfs_soc:file r_file_perms; 35 36 # request_firmware causes a denial. It can be safely ignored 37 dontaudit wcnss_service firmware_file:dir search; 38 39 r_dir_file(wcnss_service, sysfs_net) 40 41 # used for collecting the sku for radio for BDF file selection 42 get_prop(wcnss_service, vendor_radio_sku_prop) 43 44 dontaudit wcnss_service kernel:system module_request; 45