sepolicy: Fix denials in location app
- Add rule for write access to dpmtcm_socket sock file - Add few domains to dont audit rule list for vendor_gles_data_file dir search. Change-Id: Iabc0250d2ac0bf28e4f4dd3d8c67b4bf20fbeb1e CRs-Fixed: 2469209
This commit is contained in:
		
							
								
								
									
										4
									
								
								generic/vendor/test/domain.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								generic/vendor/test/domain.te
									
									
									
									
										vendored
									
									
								
							@@ -31,6 +31,10 @@ dontaudit {
 | 
			
		||||
    bootanim
 | 
			
		||||
    system_app
 | 
			
		||||
    platform_app
 | 
			
		||||
    untrusted_app_27
 | 
			
		||||
    zygote
 | 
			
		||||
    location_app
 | 
			
		||||
    location_app_test
 | 
			
		||||
    priv_app
 | 
			
		||||
    radio
 | 
			
		||||
    shell
 | 
			
		||||
 
 | 
			
		||||
@@ -44,6 +44,8 @@ allow location_app app_api_service:service_manager find;
 | 
			
		||||
allow location_app system_app_data_file:dir create_dir_perms;
 | 
			
		||||
allow location_app system_app_data_file:file create_file_perms;
 | 
			
		||||
 | 
			
		||||
unix_socket_connect(location_app, dpmtcm, dpmd);
 | 
			
		||||
 | 
			
		||||
allow location_app cgroup:file rw_file_perms;
 | 
			
		||||
 | 
			
		||||
unix_socket_send(location_app, seempdw, seempd);
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user