sdm710-common: sepolicy: Adress IORap usap_pool denial
W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for path="/dev/socket/usap_pool_primary" scontext=u:rradios0 tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
This commit is contained in:
parent
d8f8c9232b
commit
ca32a5f18f
11 changed files with 11 additions and 3 deletions
1
sepolicy/private/permissioncontroller_app.te
Normal file
1
sepolicy/private/permissioncontroller_app.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow permissioncontroller_app zygote:unix_stream_socket getopt;
|
1
sepolicy/private/untrusted_app.te
Normal file
1
sepolicy/private/untrusted_app.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow untrusted_app zygote:unix_stream_socket getopt;
|
2
sepolicy/vendor/platform_app.te
vendored
2
sepolicy/vendor/platform_app.te
vendored
|
@ -1 +1 @@
|
|||
allow platform_app zygote:unix_stream_socket getopt;
|
||||
allow platform_app zygote:unix_stream_socket getopt;
|
||||
|
|
2
sepolicy/vendor/priv_app.te
vendored
2
sepolicy/vendor/priv_app.te
vendored
|
@ -1 +1 @@
|
|||
allow priv_app zygote:unix_stream_socket getopt;
|
||||
allow priv_app zygote:unix_stream_socket getopt;
|
||||
|
|
1
sepolicy/vendor/radio.te
vendored
Normal file
1
sepolicy/vendor/radio.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow radio zygote:unix_stream_socket getopt;
|
1
sepolicy/vendor/shell.te
vendored
Normal file
1
sepolicy/vendor/shell.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow shell zygote:unix_stream_socket getopt;
|
1
sepolicy/vendor/timeservice_app.te
vendored
Normal file
1
sepolicy/vendor/timeservice_app.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow timeservice_app zygote:unix_stream_socket getopt;
|
1
sepolicy/vendor/traceur_app.te
vendored
Normal file
1
sepolicy/vendor/traceur_app.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow traceur_app zygote:unix_stream_socket getopt;
|
2
sepolicy/vendor/untrusted_app_27.te
vendored
2
sepolicy/vendor/untrusted_app_27.te
vendored
|
@ -1 +1 @@
|
|||
allow untrusted_app_27 zygote:unix_stream_socket { getopt };
|
||||
allow untrusted_app_27 zygote:unix_stream_socket getopt;
|
||||
|
|
1
sepolicy/vendor/untrusted_app_29.te
vendored
Normal file
1
sepolicy/vendor/untrusted_app_29.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow untrusted_app_29 zygote:unix_stream_socket getopt;
|
1
sepolicy/vendor/untrusted_app_30.te
vendored
Normal file
1
sepolicy/vendor/untrusted_app_30.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
allow untrusted_app_30 zygote:unix_stream_socket getopt;
|
Loading…
Reference in a new issue