platform_device_qcom_sepoli.../qva/vendor/neo
Uttkarsh Aggarwal ad1ddc4a5d sepoliy_vndr: Handle write permission on configfs
In current implementation for NCM enablement we do
cd /config/usb_gadget/g1/functions/ncm.0
echo WINNCM > os_desc/interface.ncm/compatible_id
Here we simply trying to write inside configfs which cause
AVC denial.
AVC denial:
type=1400 audit(0.0:12): avc: denied { write } for comm="init.qcom.usb.s"
name="interface.ncm" dev="configfs" ino=34930 scontext=u:r:vendor_qti_init_shell:s0
tcontext=u:object_r:configfs:s0 tclass=dir permissive=0.
type=1400 audit(0.0:12): avc: denied { create } for comm="init.qcom.usb.s"
name="compatible_id" scontext=u:r:vendor_qti_init_shell:s0
tcontext=u:object_r:configfs:s0 tclass=file permissive=0.
type=1400 audit(0.0:12): avc: denied { create } for comm="init.qcom.usb.s"
name="compatible_id" scontext=u:r:vendor_qti_init_shell:s0
tcontext=u:object_r:configfs:s0 tclass=file permissive=0.

In this patch we are giving permission to write in configfs in target
specific files.

Change-Id: I7d3843c46cfae8ac34d6d59e510274cbb5509697
Signed-off-by: Uttkarsh Aggarwal <quic_uaggarwa@quicinc.com>
2023-06-16 14:38:42 +05:30
..
file_contexts sepolicy: Allow clients to access bluetooth LAZY HIDL 2022-06-16 12:14:36 +05:30
init_shell.te sepoliy_vndr: Handle write permission on configfs 2023-06-16 14:38:42 +05:30