aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorkleidione Freitas <kleidione@gmail.com>2022-03-20 17:43:23 -0300
committersinanmohd <pcmsinan@gmail.com>2023-01-05 22:04:15 +0530
commit4c3a0d1f52fa05bab0fe6e4dfc8312a030d8adfa (patch)
treeb17504dc04fde176b13bd554617926c41aa3bd41
parent4410a6e725d5dc204a425a169c14f250087276b1 (diff)
veux: sepolicy: Add more sepolicy rule for hal default sensor
- [ 7206.619148] type=1400 audit(1666291831.667:316): avc: denied { ioctl } for comm="sensors@2.1-ser" path="socket:[441443]" dev="sockfs" ino=441443 ioctlcmd=0xc502 scontext=u:r:hal_sensors_default:s0 tcontext=u:r:hal_sensors_default:s0 tclass=qipcrtr_socket permissive=0 Signed-off-by: kleidione <kleidione@gmail.com>
-rw-r--r--sepolicy/vendor/hal_sensors_default.te2
1 files changed, 2 insertions, 0 deletions
diff --git a/sepolicy/vendor/hal_sensors_default.te b/sepolicy/vendor/hal_sensors_default.te
index 1d3339e..3640403 100644
--- a/sepolicy/vendor/hal_sensors_default.te
+++ b/sepolicy/vendor/hal_sensors_default.te
@@ -2,6 +2,8 @@ binder_call(hal_sensors_default, hal_audio_default)
hal_client_domain(hal_sensors_default, hal_audio)
+allow hal_sensors_default hal_sensors_default:qipcrtr_socket { ioctl };
+
allow hal_sensors_default audio_socket:sock_file rw_file_perms;
allow hal_sensors_default socket_device:sock_file rw_file_perms;
allow hal_sensors_default sound_device:chr_file rw_file_perms;