Max Bires b387500a64 Fixing the following denials in order to prep ims for enforcing
If there is no security issue with having ims write to ims_socket, then
I am fine with granting the permission in order to hurry up the
enforcing status of this domain.

denied { read } for pid=888 comm="imsdatadaemon" name="timestamp_switch"
dev="sysfs" ino=27246 scontext=u:r:ims:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { open } for pid=888 comm="imsdatadaemon"
path="/sys/module/diagchar/parameters/timestamp_switch" dev="sysfs"
ino=27246 scontext=u:r:ims:s0 tcontext=u:object_r:sysfs:s0 tclass=file

denied { read } for pid=1326 comm="imsrcsd" name="timestamp_switch"
dev="sysfs" ino=27246 scontext=u:r:hal_rcsservice:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { write } for pid=1077 comm="ims_rtp_daemon" name="ims_datad"
dev="tmpfs" ino=27069 scontext=u:r:ims:s0
tcontext=u:object_r:ims_socket:s0 tclass=sock_file

Bug: 34784662
Test: These denials no longer appear
Change-Id: I95d8b62d73fae35fca5e292e6927c4663db76e6f
2017-05-22 10:52:16 -07:00
2017-03-28 22:43:32 +00:00
2017-05-10 21:46:59 +01:00
2017-04-26 21:09:10 +00:00
2017-05-15 14:34:47 +09:00
2017-04-21 11:21:57 -07:00
2017-04-26 21:09:10 +00:00
2017-05-19 15:54:28 +08:00
2017-05-22 18:28:27 +08:00
2017-05-17 16:19:32 -07:00
2017-04-19 18:29:26 -07:00
2017-05-21 19:32:35 -07:00
2017-03-21 10:28:34 -07:00
2017-05-22 18:28:27 +08:00
Description
No description provided
4.4 MiB
Languages
C++ 54.8%
Makefile 33.2%
C 5.5%
Shell 4.6%
Python 1.3%
Other 0.6%