common: sepolicy: Allow hub_app to write to DPM/TCM socket

Fixes lots of spam. Qualcomm allows this on many appdomains,
including priv_app and untrusted_app.

01-01 20:47:44.865  6561  6561 W TcmReceiver: type=1400 audit(0.0:90): avc: denied { write } for name="tcm" dev="tmpfs" ino=20937 scontext=u:r:hub_app:s0:c512,c768 tcontext=u:object_r:vendor_dpmtcm_socket:s0 tclass=sock_file permissive=0 app=co.aospa.hub

Change-Id: I20fa1c3f6c90e5bd19173c396ebf963d9c07fffb
This commit is contained in:
Jake Weinstein 2023-01-02 03:20:45 +00:00 committed by Omkar Chandorkar
parent 1f19e27191
commit d40ae3eec3
1 changed files with 2 additions and 0 deletions

View File

@ -0,0 +1,2 @@
# Allow hub_app to write to the DPM/TCM socket
allow hub_app vendor_dpmtcm_socket:sock_file w_file_perms;