@@ -102,6 +102,7 @@ dev_getattr_mtrr_dev(devicekit_disk_t)
102102dev_getattr_usbfs_dirs(devicekit_disk_t)
103103dev_read_rand(devicekit_disk_t)
104104dev_read_urand(devicekit_disk_t)
105+ dev_rw_lvm_control(devicekit_disk_t)
105106dev_rw_sysfs(devicekit_disk_t)
106107
107108domain_getattr_all_pipes(devicekit_disk_t)
@@ -116,6 +117,7 @@ files_getattr_all_files(devicekit_disk_t)
116117files_getattr_all_pipes(devicekit_disk_t)
117118files_manage_boot_dirs(devicekit_disk_t)
118119files_manage_mnt_dirs(devicekit_disk_t)
120+ files_mounton_mnt(devicekit_disk_t)
119121files_read_etc_runtime_files(devicekit_disk_t)
120122files_read_usr_files(devicekit_disk_t)
121123files_watch_etc_dirs(devicekit_disk_t)
@@ -131,6 +133,9 @@ mls_file_read_all_levels(devicekit_disk_t)
131133mls_file_write_to_clearance(devicekit_disk_t)
132134
133135mount_rw_runtime_files(devicekit_disk_t)
136+ mount_watch_runtime_dirs(devicekit_disk_t)
137+ mount_watch_runtime_files(devicekit_disk_t)
138+ mount_watch_runtime_files_reads(devicekit_disk_t)
134139
135140storage_raw_read_fixed_disk(devicekit_disk_t)
136141storage_raw_write_fixed_disk(devicekit_disk_t)
@@ -204,7 +209,7 @@ optional_policy(`
204209
205210allow devicekit_power_t self:capability { dac_override net_admin sys_admin sys_nice sys_ptrace sys_tty_config };
206211allow devicekit_power_t self:capability2 wake_alarm;
207- allow devicekit_power_t self:process { getsched signal_perms };
212+ allow devicekit_power_t self:process { getsched setsched signal_perms };
208213allow devicekit_power_t self:fifo_file rw_fifo_file_perms;
209214allow devicekit_power_t self:unix_dgram_socket create_socket_perms;
210215allow devicekit_power_t self:unix_stream_socket create_socket_perms;
0 commit comments