diff --git a/sepolicy/ohos_policy/systemabilitymgr/selection_fwk/system/selection_service.te b/sepolicy/ohos_policy/systemabilitymgr/selection_fwk/system/selection_service.te index 1afbf178f24cf03330108c3432e6ffa15085b49b..c7b40eb8a7a9092f6f375523ccdfe5f747fc0f4b 100644 --- a/sepolicy/ohos_policy/systemabilitymgr/selection_fwk/system/selection_service.te +++ b/sepolicy/ohos_policy/systemabilitymgr/selection_fwk/system/selection_service.te @@ -153,3 +153,6 @@ allow selection_service dev_uinput:chr_file { ioctl open write }; # avc: denied { ioctl } for pid=47269, comm="/system/bin/sa_main" path="/dev/uinput" dev="" ino=381 ioctlcmd=0x5565 scontext=u:r:selection_service:s0 tcontext=u:object_r:dev_uinput:s0 tclass=chr_file permissive=1 # avc: denied { ioctl } for pid=47269, comm="/system/bin/sa_main" path="/dev/uinput" dev="" ino=381 ioctlcmd=0x5501 scontext=u:r:selection_service:s0 tcontext=u:object_r:dev_uinput:s0 tclass=chr_file permissive=1 allowxperm selection_service dev_uinput:chr_file ioctl { 0x5564 0x5501 0x5565 }; + +# avc: denied { call } for pid=1646, comm="/system/bin/sa_main" scontext=u:r:selection_service:s0 tcontext=u:r:powermgr:s0 tclass=binder permissive=1 +allow selection_service powermgr:binder { call transfer };