From a4472b639350edce8f20caf7a3453b5d2e56eaa5 Mon Sep 17 00:00:00 2001 From: Anand S Date: Thu, 8 Aug 2024 20:16:00 +0530 Subject: [PATCH] sm6375-common: sepolicy: Allow capsense_reset to create netlink_kobject_uevent_socket * W capsense_reset: type=1400 audit(0.0:42): avc: denied { create } for scontext=u:r:capsense_reset:s0 tcontext=u:r:capsense_reset:s0 tclass=netlink_kobject_uevent_socket permissive=0 Change-Id: I0219ec9cd04b913de53f3ae02f8047ae00932252 --- sepolicy/vendor/capsense_reset.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/sepolicy/vendor/capsense_reset.te b/sepolicy/vendor/capsense_reset.te index 09c1657..94f137b 100644 --- a/sepolicy/vendor/capsense_reset.te +++ b/sepolicy/vendor/capsense_reset.te @@ -8,5 +8,7 @@ allow capsense_reset kmsg_device:chr_file rw_file_perms; allow capsense_reset input_device:dir r_dir_perms; allow capsense_reset input_device:chr_file r_file_perms; +allow capsense_reset self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; + allow capsense_reset vendor_sysfs_sensors:dir r_dir_perms; allow capsense_reset vendor_sysfs_sensors:file rw_file_perms;