Files
device_google_walleye/sepolicy/device.te
Max Bires 4e84fa0008 Adding sg_device and allow rules to tee.te
There was a generic character file device that needed to be given its
own device type. Accordingly to the following denial, tee was given
several permissions to access this type

avc: denied { ioctl write setattr read } for pid=733 comm="qseecomd"
name="sg2" dev="tmpfs" ino=21736 scontext=u:r:tee:s0
tcontext=u:object_r:sg_device:s0 tclass=chr_file

According to the following denial type, tee was also given access actions
relating to tee capabilities

avc: denied { sys_admin } for pid=733 comm="qseecomd" capability=21
scontext=u:r:tee:s0 tcontext=u:r:tee:s0 tclass=capability

Bug: 34784662
Test: The above denials no longer appear in bootup logs
Change-Id: I26a63655597191da566f1ed1e290c6572abb0476
2017-02-07 12:59:04 -08:00

16 lines
470 B
Plaintext

type diag_device, dev_type, mlstrustedobject;
type smd_device, dev_type;
type ipa_dev, dev_type;
type rmnet_device, dev_type;
type at_device, dev_type;
type qsee_ipc_irq_spss_device, dev_type;
type seemplog_device, dev_type;
type spcom_device, dev_type;
type qdsp_device, dev_type, mlstrustedobject;
type dsp_device, dev_type;
type avtimer_device, dev_type;
type ssr_device, dev_type;
type ramdump_device, dev_type;
type hbtp_device, dev_type;
type sg_device, dev_type;