android_device_xiaomi_sdm66.../sepolicy/vendor/system_app.te
Alcatraz323 3bf23bb2d7 sdm660-common: sepolicy: allow system_app to access hall_dev
* 08-12 22:43:25.794  1674  1674 W settings.device: type=1400 audit(0.0:7): avc: denied { search } for name="parameters" dev="sysfs" ino=21188 scontext=u:r:system_app:s0 tcontext=u:object_r:hall_dev:s0 tclass=dir permissive=0

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:45:13 +02:00

29 lines
1.2 KiB
Text

allow system_app blkio_dev:dir search;
allow system_app hall_dev:dir r_dir_perms;
allow system_app hall_dev:file rw_file_perms;
allow system_app hall_dev:lnk_file r_file_perms;
allow system_app kcal_dev:dir search;
allow system_app kcal_dev:file rw_file_perms;
allow system_app proc_pagetypeinfo:file r_file_perms;
allow system_app proc_vmallocinfo:file read;
allow system_app sysfs_fcharge:file rw_file_perms;
allow system_app sysfs_vibrator:dir search;
allow system_app sysfs_vibrator:file rw_file_perms;
allow system_app sysfs_graphics:dir search;
allow system_app sysfs_graphics:file rw_file_perms;
allow system_app sysfs_leds:dir search;
allow system_app sysfs_fpsinfo:file rw_file_perms;
allow system_app sysfs_headphonegain:file rw_file_perms;
allow system_app sysfs_micgain:file rw_file_perms;
allow system_app sysfs_earpiecegain:file rw_file_perms;
allow system_app sysfs_zram:dir search;
allow system_app sysfs_zram:file r_file_perms;
allow system_app zygote:unix_stream_socket { getopt };
# neverallow and harmless
dontaudit system_app time_daemon:unix_stream_socket { connectto };
get_prop(system_app, system_prop);
set_prop(system_app, system_prop);
get_prop(system_app, qemu_hw_prop);
hal_client_domain(system_app, hal_mlipay);