Address more denials from when running as enforcing
authorHenrik Grimler <henrik@grimler.se>
Tue, 1 Sep 2020 12:23:07 +0000 (14:23 +0200)
committerJan Altensen <info@stricted.net>
Sun, 18 Oct 2020 09:48:31 +0000 (11:48 +0200)
commitdd5829c75ab621e4c0a723ca6268f307f050e791
tree378402ac6c453c35b19545440096c8be78536528
parentbb31d916f4eec4c0010144e6e1aa7567785c6b06
Address more denials from when running as enforcing

Mostly working now.
These denials are left to fix:
```
kworker/u16:1: type=1400 audit(0.0:85): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
kworker/u16:1: type=1400 audit(0.0:86): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
type=1400 audit(1598966762.983:15): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
type=1400 audit(1598966762.983:15): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
```
sepolicy/hal_audio_default.te
sepolicy/hal_camera_default.te
sepolicy/hal_nfc_default.te
sepolicy/hwservice_contexts
sepolicy/kernel.te
sepolicy/lhd.te
sepolicy/rild.te
sepolicy/tee.te
sepolicy/untrusted_app.te