Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ adb shell su -c dmesg | grep denied | audit2allow -p out/target/product/ls990/root/sepolicy
- #============= blkid_untrusted ==============
- allow blkid_untrusted sysfs:file { getattr open read };
- #============= bluetooth ==============
- allow bluetooth self:capability2 0x8;
- #============= bootstat ==============
- allow bootstat sysfs:file { getattr open read };
- #============= fsck ==============
- allow fsck block_device:blk_file { ioctl open read write };
- #============= hal_allocator_default ==============
- allow hal_allocator_default sysfs:file { getattr open read };
- #============= hal_bluetooth_default ==============
- allow hal_bluetooth_default bluetooth_data_file:file { open read };
- allow hal_bluetooth_default firmware_file:dir { open read };
- allow hal_bluetooth_default firmware_file:file { open read };
- allow hal_bluetooth_default proc:file { open write };
- allow hal_bluetooth_default sysfs:file write;
- #============= hal_wifi_default ==============
- allow hal_wifi_default sysfs:file write;
- #============= hal_wifi_supplicant_default ==============
- allow hal_wifi_supplicant_default device:chr_file { open read };
- #============= hwservicemanager ==============
- allow hwservicemanager sysfs:file { getattr open read };
- #============= init ==============
- allow init device_latency:chr_file write;
- allow init netd:unix_stream_socket connectto;
- allow init netd_socket:sock_file write;
- allow init qmuxd_socket:sock_file write;
- allow init rtc_device:chr_file ioctl;
- allow init self:netlink_kobject_uevent_socket { bind create read setopt };
- allow init self:netlink_route_socket { bind create read };
- allow init self:netlink_socket { bind create write };
- allow init self:netlink_xfrm_socket { bind create };
- allow init self:rawip_socket { create getopt setopt };
- allow init self:socket { bind create ioctl read write };
- allow init self:udp_socket ioctl;
- allow init sensors_device:chr_file ioctl;
- allow init sensors_persist_file:file append;
- allow init shell_exec:file execute_no_trans;
- allow init smd_device:chr_file { ioctl write };
- allow init socket_device:sock_file { create getattr setattr write };
- allow init thermal_device:chr_file ioctl;
- allow init uio_device:chr_file write;
- allow init video_device:chr_file { ioctl write };
- #============= logd ==============
- allow logd sysfs:file { getattr open read };
- #============= nfc ==============
- allow nfc sysfs:dir { open read };
- #============= priv_app ==============
- allow priv_app device:dir { open read };
- allow priv_app proc_interrupts:file { open read };
- #============= radio ==============
- allow radio qmuxd_socket:sock_file write;
- allow radio system_app_data_file:dir getattr;
- #============= sgdisk ==============
- allow sgdisk sysfs:file { getattr open read };
- #============= shell ==============
- allow shell sysfs:file { getattr open read };
- #============= system_server ==============
- allow system_server alarm_boot_prop:file { getattr open };
- allow system_server persist_file:dir write;
- allow system_server qmuxd_socket:dir { add_name write };
- allow system_server qmuxd_socket:sock_file { create write };
- allow system_server sensors_device:chr_file getattr;
- allow system_server socket_device:sock_file write;
- #============= toolbox ==============
- allow toolbox block_device:blk_file { open read };
- allow toolbox init:fifo_file { getattr read write };
- allow toolbox init:unix_stream_socket connectto;
- allow toolbox property_socket:sock_file write;
- allow toolbox radio_prop:property_service\x0a set;
- allow toolbox sensors_prop:property_service\x0a set;
- allow toolbox smem_log_device:chr_file { read write };
- allow toolbox sysfs:file { getattr open read };
- #============= tzdatacheck ==============
- allow tzdatacheck sysfs:file { getattr open read };
- #============= ueventd ==============
- allow ueventd vfat:file { getattr open read };
- #============= untrusted_app ==============
- allow untrusted_app sysfs:file { getattr open read };
- allow untrusted_app untrusted_app_devpts:chr_file ioctl;
- #============= untrusted_app_25 ==============
- allow untrusted_app_25 sysfs:file { getattr open read };
- #============= vdc ==============
- allow vdc sysfs:file { getattr open read };
- #============= webview_zygote ==============
- allow webview_zygote sysfs:file { getattr open read };
Advertisement
Add Comment
Please, Sign In to add comment