!2434 fix: add dmsfwk and dcamera selinux policy

Merge pull request !2434 from hobbycao/master
This commit is contained in:
openharmony_ci 2023-05-31 02:24:09 +00:00 committed by Gitee
commit 11bb530645
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
3 changed files with 8 additions and 1 deletions

View File

@ -158,6 +158,9 @@ allow dcamera vendor_bin_file:dir { search };
#avc: denied { call } for pid=571 comm="msdp" scontext=u:r:dcamera:s0 tcontext=u:r:accesstoken_service:s0 tclass=binder permissive=1
allow dcamera accesstoken_service:binder { call };
#avc: denied { get } for service=4802 pid=3227 scontext=u:r:dcamera:s0 tcontext=u:object_r:sa_foundation_devicemanager_service:s0 tclass=samgr_class permissive=1
allow dcamera sa_foundation_devicemanager_service:samgr_class { get };
allow dcamera bootevent_param:file { map open read };
allow dcamera bootevent_samgr_param:file { map open read };
allow dcamera build_version_param:file { map open read };

View File

@ -66,5 +66,9 @@ allow distributedsche sa_bgtaskmgr:samgr_class { get };
allow distributedsche sa_memory_manager_service:samgr_class { get };
#avc: denied { call } for pid=479 comm="DmsComponentCha" scontext=u:r:distributedsche:s0 tcontext=u:r:memmgrservice:s0 tclass=binder permissive=0
allow distributedsche memmgrservice:binder { call };
#avc: denied { get } for service=402 pid=3055 scontext=u:r:distributedsche:s0 tcontext=u:object_r:sa_distributed_bundle_mgr_service_service:s0 tclass=samgr_class permissive=1
allow distributedsche sa_distributed_bundle_mgr_service_service:samgr_class { get };
#avc: denied { call } for pid=479 comm="continue_manage" scontext=u:r:distributedsche:s0 tcontext=u:r:d-bms:s0 tclass=binder permissive=0
allow distributedsche d-bms:binder { call };
neverallow {domain -samgr -distributedsche} sa_distributeschedule:samgr_class { get_remote };

View File

@ -11,6 +11,6 @@
# See the License for the specific language governing permissions and
# limitations under the License.
allow softbus_server distributedsche:binder { call };
allow softbus_server distributedsche:binder { call transfer };
allow softbus_server normal_hap_attr:binder { call };
allow softbus_server sa_privacy_service:samgr_class { get };