mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Allow access to sysfs_timestamp_switch.
We've seen these processes trying to access this file, so allow it. Note that this is likely why they needed the sysfs_diag permission we granted earlier. Bug: 77908806 Test: Build Change-Id: I60a2dae5a0635156070397242f13695678f1d00e
This commit is contained in:
1
sepolicy/vendor/hal_gnss_qti.te
vendored
1
sepolicy/vendor/hal_gnss_qti.te
vendored
@@ -33,6 +33,7 @@ allow hal_gnss_qti self:netlink_route_socket { bind create nlmsg_read read write
|
||||
userdebug_or_eng(`
|
||||
allow hal_gnss_qti diag_device:chr_file rw_file_perms;
|
||||
r_dir_file(hal_gnss_qti, sysfs_diag)
|
||||
allow hal_gnss_qti sysfs_timestamp_switch:file r_file_perms;
|
||||
')
|
||||
dontaudit hal_gnss_qti diag_device:chr_file rw_file_perms;
|
||||
dontaudit hal_gnss_qti sysfs_diag:dir search;
|
||||
|
||||
1
sepolicy/vendor/qti.te
vendored
1
sepolicy/vendor/qti.te
vendored
@@ -18,6 +18,7 @@ r_dir_file(qti, sysfs_msm_subsys)
|
||||
userdebug_or_eng(`
|
||||
allow qti diag_device:chr_file rw_file_perms;
|
||||
r_dir_file(qti, sysfs_diag)
|
||||
allow qti sysfs_timestamp_switch:file r_file_perms;
|
||||
')
|
||||
dontaudit qti diag_device:chr_file rw_file_perms;
|
||||
dontaudit qti sysfs_diag:dir search;
|
||||
|
||||
1
sepolicy/vendor/radio.te
vendored
1
sepolicy/vendor/radio.te
vendored
@@ -28,6 +28,7 @@ binder_call(radio, hal_imsrtp)
|
||||
userdebug_or_eng(`
|
||||
allow radio diag_device:chr_file rw_file_perms;
|
||||
r_dir_file(radio, sysfs_diag)
|
||||
allow radio sysfs_timestamp_switch:file r_file_perms;
|
||||
')
|
||||
dontaudit radio diag_device:chr_file rw_file_perms;
|
||||
dontaudit radio sysfs_diag:dir search;
|
||||
|
||||
Reference in New Issue
Block a user