device_google_lynx/vendor/hal_wifi_ext.te
Hsiu-Chang Chen 63cd5c6143 Add sepolicy for pixellogger
04-25 11:36:17.795  4101  4101 I auditd  : type=1400 audit(0.0:6339): avc: denied { search } for comm="LoggingService" name="wifi" dev="dm-40" ino=338 scontext=u:r:logger_app:s0:c229,c256,c512,c768 tcontext=u:object_r:vendor_wifi_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.pixellogger
04-25 11:36:17.799   863   863 I auditd  : type=1400 audit(0.0:6340): avc: denied { search } for comm="wifi_ext@1.0-se" name="wifi" dev="dm-40" ino=338 scontext=u:r:hal_wifi_ext:s0 tcontext=u:object_r:vendor_wifi_vendor_data_file:s0 tclass=dir permissive=1

Bug: 230280450
Test: Pixelloger can collect WLAN logs
Change-Id: Id95e4132f2814deb1fbfb307568a4ece87a28611
2022-04-25 11:49:43 +08:00

13 lines
681 B
Text

allow hal_wifi_ext vendor_wlan_device:chr_file w_file_perms;
allow hal_wifi_ext vendor_wifi_vendor_data_file:dir rw_dir_perms;
# write to files owned by location daemon
allow hal_wifi_ext vendor_location_socket:dir rw_dir_perms;
allow hal_wifi_ext vendor_location_socket:{sock_file lnk_file} create_file_perms;
allow hal_wifi_ext vendor_location:unix_dgram_socket sendto;
allow hal_wifi_ext lowi_server:unix_dgram_socket sendto;
# Connect to vendor_location via vendor_location socket.
unix_socket_connect(hal_wifi, vendor_location, vendor_location)
allow hal_wifi_ext vendor_wifihal_socket:dir rw_dir_perms;
allow hal_wifi_ext vendor_wifihal_socket:sock_file create_file_perms;