1# Copyright (c) 2022 Huawei Device Co., Ltd. 2# Licensed under the Apache License, Version 2.0 (the "License"); 3# you may not use this file except in compliance with the License. 4# You may obtain a copy of the License at 5# 6# http://www.apache.org/licenses/LICENSE-2.0 7# 8# Unless required by applicable law or agreed to in writing, software 9# distributed under the License is distributed on an "AS IS" BASIS, 10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 11# See the License for the specific language governing permissions and 12# limitations under the License. 13 14allow softbus_server bluetooth_service:fd { use }; 15allow softbus_server bluetooth_service:unix_stream_socket { read read write setopt shutdown write }; 16 17#avc: denied { call } for pid=496 comm="softbus_server" scontext=u:r:softbus_server:s0 tcontext=u:r:dcamera:s0 tclass=binder permissive=0 18allow softbus_server dcamera:binder { call transfer }; 19 20#avc: denied { call } for pid=471 comm="softbus_server" scontext=u:r:softbus_server:s0 tcontext=u:r:dscreen:s0 tclass=binder permissive=0 21allow softbus_server dscreen:binder { call }; 22 23allow softbus_server d-bms:binder { call }; 24 25#avc: denied { transfer } for pid=558 comm="softbus_server" scontext=u:r:softbus_server:s0 tcontext=u:r:normal_hap:s0 tclass=binder permissive=0 26#avc: denied { transfer } for pid=471 comm="softbus_server" scontext=u:r:softbus_server:s0 tcontext=u:r:normal_hap:s0 tclass=binder permissive=0 27allow softbus_server normal_hap:binder { call transfer }; 28 29#avc: denied { use } for pid=1537 comm="com.ohos.settin" path="/dev/ashmem" dev="tmpfs" ino=178 scontext=u:r:softbus_server:s0 tcontext=u:r:normal_hap:s0 tclass=fd permissive=0 30#avc: denied { use } for pid=1601 comm="com.ohos.settin" path="/dev/ashmem" dev="tmpfs" ino=177 scontext=u:r:softbus_server:s0 tcontext=u:r:normal_hap:s0 tclass=fd permissive=0 31allow softbus_server normal_hap:fd { use }; 32 33allow softbus_server sa_accesstoken_manager_service:samgr_class { get }; 34allow softbus_server sa_accountmgr:samgr_class { get }; 35allow softbus_server sa_bluetooth_server:samgr_class { get }; 36allow softbus_server sa_foundation_abilityms:samgr_class { get }; 37allow softbus_server sa_foundation_cesfwk_service:samgr_class { get }; 38allow softbus_server sa_param_watcher:samgr_class { get }; 39 40#avc: denied { get } for service=3505 pid=532 scontext=u:r:softbus_server:s0 tcontext=u:object_r:sa_privacy_service:s0 tclass=samgr_class permissive=0 41allow softbus_server sa_privacy_service:samgr_class { get }; 42 43allow softbus_server sa_softbus_service:samgr_class { add get }; 44allow softbus_server sa_wifi_device_ability:samgr_class { get }; 45allow softbus_server sa_wifi_hotspot_ability:samgr_class { get }; 46allow softbus_server sa_wifi_p2p_ability:samgr_class { get }; 47allow softbus_server sa_wifi_scan_ability:samgr_class { get }; 48allow softbus_server sh:binder { call }; 49 50#avc: denied { create } for pid=540 comm="softbus_server" scontext=u:r:softbus_server:s0 tcontext=u:r:softbus_server:s0 tclass=socket permissive=0 51allow softbus_server softbus_server:socket { bind create ioctl setopt shutdown }; 52 53#avc: denied { getopt } for pid=482 comm="THREAD_POOL" scontext=u:r:softbus_server:s0 tcontext=u:r:softbus_server:s0 tclass=tcp_socket permissive=1 54allow softbus_server softbus_server:tcp_socket { getopt }; 55 56#avc: denied { ioctl } for pid=526 comm="softbus_server" path="socket:[36080]" dev="sockfs" ino=36080 ioctlcmd=0x8933 scontext=u:r:softbus_server:s0 tcontext=u:r:softbus_server:s0 tclass=socket permissive=0 57allowxperm softbus_server softbus_server:socket ioctl { 0x8933 }; 58 59#avc: denied { call } for pid=509 comm="0IPC_686" scontext=u:r:softbus_server:s0 tcontext=u:r:system_core_hap:s0 tclass=binder permissive=0 60allow softbus_server system_core_hap:binder { call }; 61 62binder_call(softbus_server, privacy_service); 63 64allow softbus_server musl_param:file { open map read }; 65 66#avc: denied { use } for pid=530 comm="IPC_0_952" path="/dev/ashmem" dev="tmpfs" ino=184 scontext=u:r:softbus_server:s0 tcontext=u:r:distributeddata:s0 tclass=fd permissive=1 67allow softbus_server distributeddata:fd { use }; 68 69#avc: denied { get } for service=1301 pid=494 scontext=u:r:softbus_server:s0 tcontext=u:object_r:sa_distributeddata_service:s0 tclass=samgr_class permissive=0 70allow softbus_server sa_distributeddata_service:samgr_class { get }; 71 72#avc: denied { get } for service=182 pid=522 scontext=u:r:softbus_server:s0 tcontext=u:object_r:sa_dataobs_mgr_service_service:s0 tclass=samgr_class permissive=0 73allow softbus_server sa_dataobs_mgr_service_service:samgr_class { get }; 74