sm7250-common: sepolicy: Adress IORap usap_pool denial

W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for path="/dev/socket/usap_pool_primary" scontext=u:r:radio:s0 tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0

Signed-off-by: iusmac <iusico.maxim@libero.it>
This commit is contained in:
iusmac 2022-02-26 13:51:11 +01:00 committed by mikairyuu
parent bb99f9e2a6
commit 1ea059b2ea
9 changed files with 9 additions and 0 deletions

View File

@ -0,0 +1 @@
allow untrusted_app zygote:unix_stream_socket { getopt };

View File

@ -0,0 +1 @@
allow updater_app zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/mediaprovider.te vendored Normal file
View File

@ -0,0 +1 @@
allow mediaprovider zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/platform_app.te vendored Normal file
View File

@ -0,0 +1 @@
allow platform_app zygote:unix_stream_socket { getopt };

View File

@ -1 +1,2 @@
get_prop(radio, vendor_audio_prop)
allow radio zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/shell.te vendored Normal file
View File

@ -0,0 +1 @@
allow shell zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/traceur_app.te vendored Normal file
View File

@ -0,0 +1 @@
allow traceur_app zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/untrusted_app_27.te vendored Normal file
View File

@ -0,0 +1 @@
allow untrusted_app_27 zygote:unix_stream_socket { getopt };

1
sepolicy/vendor/untrusted_app_29.te vendored Normal file
View File

@ -0,0 +1 @@
allow untrusted_app_29 zygote:unix_stream_socket { getopt };