device_google_lynx/vendor
Chris Paulo b5eec482fd device-sepolicy: Add sepolicy for vibrator hal
Added sepolicy for vibrator hal specific to device

uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=vibrator.adaptive_haptics.enabled pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1'
avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=80 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1
avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=80 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1
avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=80 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1
avc: denied { write } for comm="android.hardwar" name="chre" dev="tmpfs" ino=1094 scontext=u:r:hal_vibrator_default:s0 tcontext=u:object_r:chre_socket:s0 tclass=sock_file permissive=1
avc: denied { connectto } for comm="android.hardwar" path="/dev/socket/chre" scontext=u:r:hal_vibrator_default:s0 tcontext=u:r:chre:s0 tclass=unix_stream_socket permissive=1
avc: denied { open } for comm="binder:8084_3" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=80 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 app=com.google.android.gms
avc: denied { getattr } for comm="binder:8084_3" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=80 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 app=com.google.android.gms

Bug: 198239103
Test: Verified functionality
Signed-off-by: Chris Paulo <chrispaulo@google.com>
Change-Id: Ib118b553eab1db6f9fadaebeae0d57eb329294e3
2022-11-15 05:27:55 +00:00
..
device.te wifi: Add sepolicy for qcom driver control interface 2022-01-10 14:45:30 +08:00
file.te Add sepolicy for hal_wifi_ext 2022-07-27 08:27:21 +00:00
file_contexts device-sepolicy: Add sepolicy for vibrator hal 2022-11-15 05:27:55 +00:00
genfs_contexts wifi: correct label wlan0/p2p0/wifi-aware0 device as sysfs_net 2022-08-02 08:54:18 +00:00
hal_power_stats_default.te sepolicy: allow hal_power_stats to read wifi sysfs and property 2022-07-28 15:48:41 +08:00
hal_radioext_default.te Fix avc denied for hal_radioext_default 2022-08-04 07:19:10 +08:00
hal_vibrator_default.te device-sepolicy: Add sepolicy for vibrator hal 2022-11-15 05:27:55 +00:00
hal_wifi_default.te Add sepolicy rules for hal_wifi_default 2022-10-15 02:50:33 +00:00
hal_wifi_ext.te Add sepolicy for hal_wifi_ext 2022-07-27 08:27:21 +00:00
hal_wifi_hostapd.te wifi: Add sepolicy for LOWI tools 2022-03-15 09:37:05 +00:00
hal_wifi_supplicant.te wifi: Add sepolicy for LOWI tools 2022-03-15 09:37:05 +00:00
ioctl_macros wifi: Add sepolicy for LOWI tools 2022-03-15 09:37:05 +00:00
logger_app.te Add sepolicy for pixellogger 2022-04-25 11:49:43 +08:00
lowi_server.te Add sepolicy rules for hal_wifi_default 2022-10-15 02:50:33 +00:00
property_contexts device-sepolicy: Add sepolicy for vibrator hal 2022-11-15 05:27:55 +00:00
README.txt Initial device lynx sepolicy 2021-11-01 15:28:54 +08:00
tcpdump_logger.te Add sepolicy for tcpdump_logger 2022-08-25 16:56:44 +08:00
vendor_init.te device-sepolicy: Add sepolicy for vibrator hal 2022-11-15 05:27:55 +00:00
vendor_location.te Add sepolicy rules for hal_wifi_default 2022-10-15 02:50:33 +00:00
wifi_perf_diag.te Add sepolicy for wifi_sniffer and wifi_perf_diag 2022-08-25 08:21:16 +00:00
wifi_sniffer.te Add sepolicy for wifi_sniffer and wifi_perf_diag 2022-08-25 08:21:16 +00:00

This folder holds sepolicy exclusively for one device. For example, genfs_contexts
paths that are affected by device tree.