# Policy for /system/bin/cnss-daemon type cnss-daemon, domain; type cnss-daemon_exec, exec_type, file_type; # STOPSHIP b/28340421 # Temporarily grant this permission and log its use. allow cnss-daemon self:capability { net_admin net_bind_service }; auditallow cnss-daemon self:capability net_admin; init_daemon_domain(cnss-daemon) allow cnss-daemon self:capability { setgid setuid }; # whitelist socket ioctl commands allow cnss-daemon self:netlink_socket create_socket_perms; allow cnss-daemon self:socket create_socket_perms; allowxperm cnss-daemon self:socket ioctl msm_sock_ipc_ioctls; allow cnss-daemon proc_net:file rw_file_perms; allow cnss-daemon sysfs_wifi:file write; allow cnss-daemon sysfs_pcie:file write; allow cnss-daemon sysfs_msm_core:file write; r_dir_file(cnss-daemon, sysfs_type) # access to /dev/diag on debug builds userdebug_or_eng(` allow cnss-daemon diag_device:chr_file rw_file_perms; ')