summaryrefslogtreecommitdiff
path: root/sepolicy/service.te
AgeCommit message (Collapse)Author
2015-09-10Add rules for device-services.dcashman
Address the following denials: avc: denied { add } for service=qti.ims.connectionmanagerservice scontext=u:r:ims:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager avc: denied { find } for service=vendor.qcom.PeripheralManager scontext=u:r:rild:s0 tcontext=u:object_r:per_mgr_service:s0 tclass=service_manager avc: denied { add } for service=qti.ims.connectionmanagerservice scontext=u:r:ims:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager Bug: 23935222 Change-Id: Ia41147328643e2dd9fe63faec2a23e40da718762
2015-08-20angler: selinux: add selinux rules for atfwdzhihui wu
avc: denied { add } for service=AtCmdFwd scontext=u:r:system_app:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager avc: denied { add } for service=AtCmdFwd scontext=u:r:system_app:s0 tcontext=u:object_r:atfwd_service:s0 tclass=service_manager avc: denied { add } for service=AtCmdFwd scontext=u:r:system_app:s0 tcontext=u:object_r:atfwd_service:s0 tclass=service_manager Bug: 23263806 Change-Id: Ia003f0ac26cd82db7aefa3a8cb45d9bb1fe216c6
2015-07-23Add peripheral_manager service.dcashman
Address the following denials: 01-10 22:47:53.987 402 402 E SELinux : avc: denied { add } for service=vendor.qcom.PeripheralManager scontext=u:r:per_mgr:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager 01-21 02:05:39.741 404 404 I pm-service: type=1400 audit(0.0:17): avc: denied { read write } for name="smem_log" dev="tmpfs" ino=12340 scontext=u:r:per_mgr:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-21 02:05:39.741 404 404 I pm-service: type=1400 audit(0.0:18): avc: denied { open } for path="/dev/smem_log" dev="tmpfs" ino=12340 scontext=u:r:per_mgr:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-21 02:05:39.741 404 404 I pm-service: type=1400 audit(0.0:19): avc: denied { ioctl } for path="/dev/smem_log" dev="tmpfs" ino=12340 ioctlcmd=3001 scontext=u:r:per_mgr:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:24): avc: denied { search } for name="msm_subsys" dev="sysfs" ino=4083 scontext=u:r:per_mgr:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=dir permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:25): avc: denied { read } for name="devices" dev="sysfs" ino=4085 scontext=u:r:per_mgr:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=dir permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:26): avc: denied { open } for path="/sys/bus/msm_subsys/devices" dev="sysfs" ino=4085 scontext=u:r:per_mgr:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=dir permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:27): avc: denied { read } for name="subsys0" dev="sysfs" ino=15644 scontext=u:r:per_mgr:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=lnk_file permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:28): avc: denied { call } for scontext=u:r:per_mgr:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 01-21 02:05:39.931 404 404 I pm-service: type=1400 audit(0.0:29): avc: denied { transfer } for scontext=u:r:per_mgr:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 01-21 02:05:39.931 402 402 I servicemanager: type=1400 audit(0.0:30): avc: denied { search } for name="404" dev="proc" ino=14350 scontext=u:r:servicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=dir permissive=1 01-21 02:05:39.931 402 402 I servicemanager: type=1400 audit(0.0:31): avc: denied { read } for name="current" dev="proc" ino=14375 scontext=u:r:servicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=file permissive=1 01-21 02:05:39.931 402 402 I servicemanager: type=1400 audit(0.0:32): avc: denied { open } for path="/proc/404/attr/current" dev="proc" ino=14375 scontext=u:r:servicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=file permissive=1 01-21 02:05:39.931 402 402 I servicemanager: type=1400 audit(0.0:33): avc: denied { getattr } for scontext=u:r:servicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=process permissive=1 01-21 02:05:39.931 417 417 I pm-service: type=1400 audit(0.0:34): avc: denied { create } for scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=socket permissive=1 01-21 02:05:39.931 417 417 I pm-service: type=1400 audit(0.0:35): avc: denied { ioctl } for path="socket:[13350]" dev="sockfs" ino=13350 ioctlcmd=c304 scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=socket permissive=1 01-21 02:05:39.931 417 417 I pm-service: type=1400 audit(0.0:36): avc: denied { bind } for scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=socket permissive=1 01-21 02:05:39.931 417 417 I pm-service: type=1400 audit(0.0:37): avc: denied { net_raw } for capability=13 scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=capability permissive=1 01-21 02:05:39.931 417 417 I pm-service: type=1400 audit(0.0:38): avc: denied { read } for scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=socket permissive=1 01-21 02:05:42.438 416 416 I /system/bin/pm-service: type=1400 audit(0.0:92): avc: denied { read } for comm=504F5349582074696D65722030 name="subsys_modem" dev="tmpfs" ino=11233 scontext=u:r:per_mgr:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-21 02:05:42.438 416 416 I /system/bin/pm-service: type=1400 audit(0.0:93): avc: denied { open } for comm=504F5349582074696D65722030 path="/dev/subsys_modem" dev="tmpfs" ino=11233 scontext=u:r:per_mgr:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-21 02:05:45.998 417 417 I pm-service: type=1400 audit(0.0:163): avc: denied { read } for scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=socket permissive=1 Bug: 21435401 Change-Id: I07286d206fe4c99d070b724e4ec020a971cad070