sdm710-common: sepolicy: Adress IORap usap_pool denial

W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for
path="/dev/socket/usap_pool_primary" scontext=u:rradios0
tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
This commit is contained in:
iusmac 2022-03-23 22:47:28 +08:00 committed by CakesTwix
parent d8f8c9232b
commit ca32a5f18f
Signed by: CakesTwix
GPG key ID: 7B11051D5CE19825
11 changed files with 11 additions and 3 deletions

View file

@ -0,0 +1 @@
allow permissioncontroller_app zygote:unix_stream_socket getopt;

View file

@ -0,0 +1 @@
allow untrusted_app zygote:unix_stream_socket getopt;

1
sepolicy/vendor/radio.te vendored Normal file
View file

@ -0,0 +1 @@
allow radio zygote:unix_stream_socket getopt;

1
sepolicy/vendor/shell.te vendored Normal file
View file

@ -0,0 +1 @@
allow shell zygote:unix_stream_socket getopt;

1
sepolicy/vendor/timeservice_app.te vendored Normal file
View file

@ -0,0 +1 @@
allow timeservice_app zygote:unix_stream_socket getopt;

1
sepolicy/vendor/traceur_app.te vendored Normal file
View file

@ -0,0 +1 @@
allow traceur_app zygote:unix_stream_socket getopt;

View file

@ -1 +1 @@
allow untrusted_app_27 zygote:unix_stream_socket { getopt };
allow untrusted_app_27 zygote:unix_stream_socket getopt;

1
sepolicy/vendor/untrusted_app_29.te vendored Normal file
View file

@ -0,0 +1 @@
allow untrusted_app_29 zygote:unix_stream_socket getopt;

1
sepolicy/vendor/untrusted_app_30.te vendored Normal file
View file

@ -0,0 +1 @@
allow untrusted_app_30 zygote:unix_stream_socket getopt;