From 8b9e2b383464bfc3c28e80861a88c6ae54774620 Mon Sep 17 00:00:00 2001 From: Hongbo Zeng Date: Mon, 19 Apr 2021 16:26:59 +0800 Subject: [PATCH] allow RilConfigService to call oemrilhook api 04-15 21:19:42.312 373 373 E SELinux : avc: denied { find } for pid=10245 uid=1001 name=telephony.oem.oemrilhook scontext=u:r:ril_config_service_app:s0 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0 Bug: 185747692 Test: after apply the rule, the denial log is gone Change-Id: I447c9c695f48ee3b528190ff33261ca3e9cd69df --- whitechapel/vendor/google/ril_config_service.te | 1 + 1 file changed, 1 insertion(+) diff --git a/whitechapel/vendor/google/ril_config_service.te b/whitechapel/vendor/google/ril_config_service.te index 125c8c33..0ac43317 100644 --- a/whitechapel/vendor/google/ril_config_service.te +++ b/whitechapel/vendor/google/ril_config_service.te @@ -3,6 +3,7 @@ app_domain(ril_config_service_app) set_prop(ril_config_service_app, vendor_rild_prop) allow ril_config_service_app app_api_service:service_manager find; +allow ril_config_service_app radio_service:service_manager find; allow ril_config_service_app radio_vendor_data_file:dir rw_dir_perms; allow ril_config_service_app radio_vendor_data_file:file create_file_perms; dontaudit ril_config_service_app system_data_file:dir search;