common: sepolicy: Allow hub_app to write to DPM/TCM socket
Fixes lots of spam. Qualcomm allows this on many appdomains, including priv_app and untrusted_app. 01-01 20:47:44.865 6561 6561 W TcmReceiver: type=1400 audit(0.0:90): avc: denied { write } for name="tcm" dev="tmpfs" ino=20937 scontext=u:r:hub_app:s0:c512,c768 tcontext=u:object_r:vendor_dpmtcm_socket:s0 tclass=sock_file permissive=0 app=co.aospa.hub Change-Id: I20fa1c3f6c90e5bd19173c396ebf963d9c07fffb
This commit is contained in:
parent
1f19e27191
commit
d40ae3eec3
|
@ -0,0 +1,2 @@
|
|||
# Allow hub_app to write to the DPM/TCM socket
|
||||
allow hub_app vendor_dpmtcm_socket:sock_file w_file_perms;
|
Loading…
Reference in New Issue