Files
device_google_wahoo/sepolicy/verizon/obdm_app.te
Tri Vo 1898ea64c2 Remove obdm_app access to proc label.
Instead give obdm_app read access to /proc/stat.

Bug: 65643247
Test: can login to obdm app without selinux denials

Merged-In: I368c018f883610364cd026da68085935aefd69c1
Change-Id: I368c018f883610364cd026da68085935aefd69c1
(cherry picked from commit 036ef1ebc2)
2017-11-01 22:11:45 -07:00

20 lines
552 B
Plaintext

type obdm_app, domain, coredomain;
app_domain(obdm_app)
net_domain(obdm_app)
allow obdm_app proc_stat:file r_file_perms;
# talk to /dev/diag
allow obdm_app diag_device:chr_file rw_file_perms;
allow obdm_app app_api_service:service_manager find;
allow obdm_app radio_service:service_manager find;
allow obdm_app surfaceflinger_service:service_manager find;
allow obdm_app self:socket create_socket_perms;
allowxperm obdm_app self:socket ioctl { 0x0000c302 0x0000c304 };
allow obdm_app sysfs:dir r_dir_perms;
r_dir_file(obdm_app, sysfs_msm_subsys)