Files
device_google_wahoo/sepolicy
Brian Duddie 892c70989b Add binderized sensors HAL
Make the sensors HAL binderized, and add the necessary sepolicy entries
to grant it permissions for these denials:

type=1400 audit(5246168.379:61): avc: denied { search } for pid=7558
comm="android.hardwar" name="/" dev="sdd3" ino=2
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:persist_file:s0
tclass=dir permissive=0

type=1400 audit(1493161320.949:152): avc: denied { search } for pid=7558
comm="android.hardwar" name="msm_subsys" dev="sysfs" ino=19027
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
type=1400 audit(1493161320.949:153): avc: denied { read } for pid=7558
comm="android.hardwar" name="devices" dev="sysfs" ino=19029
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
type=1400 audit(1493161320.949:154): avc: denied { open } for pid=7558
comm="android.hardwar" path="/sys/bus/msm_subsys/devices" dev="sysfs"
ino=19029 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
type=1400 audit(1493161320.949:155): avc: denied { read } for pid=7558
comm="android.hardwar" name="subsys0" dev="sysfs" ino=34647
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file permissive=1
type=1400 audit(1493161320.949:156): avc: denied { read } for pid=7558
comm="android.hardwar" name="name" dev="sysfs" ino=34639
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file permissive=1
type=1400 audit(1493161320.949:157): avc: denied { open } for pid=7558
comm="android.hardwar"
path="/sys/devices/soc/soc:qcom,ipa_fws@1e08000/subsys0/name"
dev="sysfs" ino=34639 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file permissive=1

type=1400 audit(1493161320.959:158): avc: denied { search } for pid=7558
comm="android.hardwar" name="sensors" dev="sdd3" ino=12
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:persist_sensors_file:s0 tclass=dir permissive=1
type=1400 audit(1493161320.959:159): avc: denied { read } for pid=7558
comm="android.hardwar" name="sensors_settings" dev="sdd3" ino=13
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:persist_sensors_file:s0 tclass=file permissive=1
type=1400 audit(1493161320.959:160): avc: denied { open } for pid=7558
comm="android.hardwar" path="/persist/sensors/sensors_settings"
dev="sdd3" ino=13 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:persist_sensors_file:s0 tclass=file permissive=1

type=1400 audit(1493161320.959:161): avc: denied { create } for pid=7558
comm="android.hardwar" scontext=u:r:hal_sensors_default:s0
tcontext=u:r:hal_sensors_default:s0 tclass=socket permissive=1
type=1400 audit(1493161320.959:162): avc: denied { ioctl } for pid=7558
comm="android.hardwar" path="socket:[85874]" dev="sockfs" ino=85874
ioctlcmd=c304 scontext=u:r:hal_sensors_default:s0
tcontext=u:r:hal_sensors_default:s0 tclass=socket permissive=1
type=1400 audit(1493161320.959:163): avc: denied { write } for pid=7558
comm="android.hardwar" scontext=u:r:hal_sensors_default:s0
tcontext=u:r:hal_sensors_default:s0 tclass=socket permissive=1
type=1400 audit(1493161320.979:164): avc: denied { read } for pid=7558
comm="android.hardwar" scontext=u:r:hal_sensors_default:s0
tcontext=u:r:hal_sensors_default:s0 tclass=socket permissive=1
type=1400 audit(1493161346.039:168): avc: denied { ioctl } for pid=7558
comm="sensors@1.0-ser" path="socket:[85876]" dev="sockfs" ino=85876
ioctlcmd=c302 scontext=u:r:hal_sensors_default:s0
tcontext=u:r:hal_sensors_default:s0 tclass=socket permissive=1

Bug: 36097227
Test: load on device, confirm sensors stack comes up, perform screen
  orientation sanity test, check no selinux denials in kernel log, run
  VTS using:
    vts-tradefed run commandAndExit vts --module VtsHalSensorsV1_0Target
  Note that there are known VTS failures tracked under bug 37710268.
  This change does not introduce any new failures.
Change-Id: I8f6017f3d080cde7ec009182f0f5fbb90980d424
2017-04-26 10:39:13 -07:00
..
2017-04-12 12:38:03 +00:00
2017-04-11 01:26:29 -07:00
2017-04-25 13:55:49 -07:00
2017-04-11 01:26:29 -07:00
2017-04-21 11:21:57 -07:00
2017-04-21 11:21:57 -07:00
2017-04-24 22:36:49 -07:00
2017-04-14 17:58:55 -07:00
2017-04-11 01:26:29 -07:00
2017-04-11 01:26:29 -07:00
2017-04-24 21:54:01 +00:00