1# Copyright (c) 2022 Huawei Device Co., Ltd.
2# Licensed under the Apache License, Version 2.0 (the License);
3# you may not use this file except in compliance with the License.
4# You may obtain a copy of the License at
5#
6#     http://www.apache.org/licenses/LICENSE-2.0
7#
8# Unless required by applicable law or agreed to in writing, software
9# distributed under the License is distributed on an "AS IS" BASIS,
10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
14#avc:  denied  { add } for service=901 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_useriam_useridm_service:s0 tclass=samgr_class permissive=1
15allow useriam sa_useriam_useridm_service:samgr_class { add };
16
17#avc:  denied  { add } for service=921 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_useriam_userauth_service:s0 tclass=samgr_class permissive=1
18allow useriam sa_useriam_userauth_service:samgr_class { add };
19
20#avc:  denied  { add } for service=931 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_useriam_authexecutormgr_service:s0 tclass=samgr_class permissive=1
21allow useriam sa_useriam_authexecutormgr_service:samgr_class { add };
22
23#avc:  denied  { add } for service=942 pid=515 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_useriam_faceauth_service:s0 tclass=samgr_class permissive=1
24allow useriam sa_useriam_faceauth_service:samgr_class { add };
25
26#avc:  denied  { add } for service=943 pid=918 scontext=u:r:fingerprintauth:s0 tcontext=u:object_r:sa_useriam_fingerprintauth_service:s0 tclass=samgr_class permissive=1
27allow useriam sa_useriam_fingerprintauth_service:samgr_class { add };
28
29#avc:  denied  { get } for service=931 pid=515 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_useriam_authexecutormgr_service:s0 tclass=samgr_class permissive=1
30allow useriam sa_useriam_authexecutormgr_service:samgr_class { get };
31
32#avc:  denied  { get } for service=3503 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_accesstoken_manager_service:s0 tclass=samgr_class permissive=1
33allow useriam sa_accesstoken_manager_service:samgr_class { get };
34
35#avc:  denied  { get } for service=5100 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_device_service_manager:s0 tclass=samgr_class permissive=1
36allow useriam sa_device_service_manager:samgr_class { get };
37
38#avc:  denied  { get } for service=200 pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_accountmgr:s0 tclass=samgr_class permissive=1
39allow useriam sa_accountmgr:samgr_class { get };
40
41#avc:  denied  { get } for service=user_auth_interface_service pid=573 scontext=u:r:useriam:s0 tcontext=u:object_r:hdf_user_auth_interface_service:s0 tclass=hdf_devmgr_class permissive=1
42allow useriam hdf_user_auth_interface_service:hdf_devmgr_class { get };
43
44#avc:  denied  { get } for service=face_auth_interface_service pid=552 scontext=u:r:useriam:s0 tcontext=u:object_r:hdf_face_auth_interface_service:s0 tclass=hdf_devmgr_class permissive=1
45allow useriam hdf_face_auth_interface_service:hdf_devmgr_class { get };
46
47#avc:  denied  { get } for service=fingerprint_auth_interface_service pid=918 scontext=u:r:fingerprintauth:s0 tcontext=u:object_r:hdf_fingerprint_auth_interface_service:s0 tclass=hdf_devmgr_class permissive=1
48allow useriam hdf_fingerprint_auth_interface_service:hdf_devmgr_class { get };
49
50#avc:  denied  { get } for service=401 pid=520 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_foundation_bms:s0 tclass=samgr_class permissive=0
51allow useriam sa_foundation_bms:samgr_class { get };
52
53#avc:  denied  { call } for  pid=509 comm="IPC_1_853" scontext=u:r:useriam:s0 tcontext=u:r:foundation:s0 tclass=binder permissive=0
54allow useriam foundation:binder { call };
55
56#avc:  denied  { get } for service=501 pid=625 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_foundation_appms:s0 tclass=samgr_class permissive=0
57allow useriam sa_foundation_appms:samgr_class { get };
58
59# avc:  denied  { get } for service=4802 pid=592 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_foundation_devicemanager_service:s0 tclass=samgr_class permissive=0
60allow useriam sa_foundation_devicemanager_service:samgr_class { get };
61
62# avc:  denied  { call } for  pid=546 comm="SoftBusMagInit" scontext=u:r:useriam:s0 tcontext=u:r:device_manager:s0 tclass=binder permissive=0
63# avc:  denied  { transfer } for  pid=546 comm="SoftBusMagInit" scontext=u:r:useriam:s0 tcontext=u:r:device_manager:s0 tclass=binder permissive=0
64allow useriam device_manager:binder { call transfer };
65
66# avc:  denied  { call } for  pid=265 comm="OS_IPC_1_294" scontext=u:r:device_manager:s0 tcontext=u:r:useriam:s0 tclass=binder permissive=0
67allow device_manager useriam:binder { call };
68
69# avc:  denied  { get } for service=4700 pid=519 scontext=u:r:useriam:s0 tcontext=u:object_r:sa_softbus_service:s0 tclass=samgr_class permissive=0
70allow useriam sa_softbus_service:samgr_class { get };
71
72# avc:  denied  { call } for  pid=674 comm="SoftBusMagInit" scontext=u:r:useriam:s0 tcontext=u:r:softbus_server:s0 tclass=binder permissive=0
73# avc:  denied  { transfer } for  pid=674 comm="SoftBusMagInit" scontext=u:r:useriam:s0 tcontext=u:r:softbus_server:s0 tclass=binder permissive=0
74allow useriam softbus_server:binder { call transfer };
75allow useriam softbus_server:fd { use };
76allow useriam softbus_server:tcp_socket { read write setopt shutdown };
77
78# avc:  denied  { call } for  pid=553 comm="OS_IPC_3_1801" scontext=u:r:softbus_server:s0 tcontext=u:r:useriam:s0 tclass=binder permissive=1
79allow softbus_server useriam:binder { call };
80