mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Add missing SE Policies for Hardware Info Testing
Bug: 35668291 Test: pts-tradefed run singleCommand pts Change-Id: If50b00ea6fc11884c3aad6969b8821046916335a
This commit is contained in:
1
sepolicy/vendor/file.te
vendored
1
sepolicy/vendor/file.te
vendored
@@ -9,6 +9,7 @@ type sysfs_msm_subsys_restart, sysfs_type, fs_type;
|
||||
type sysfs_net, sysfs_type, fs_type;
|
||||
type sysfs_rmtfs, sysfs_type, fs_type;
|
||||
type sysfs_soc, sysfs_type, fs_type;
|
||||
type sysfs_scsi_devices_0000, sysfs_type, fs_type;
|
||||
type sysfs_timestamp_switch, sysfs_type, fs_type;
|
||||
type sysfs_touch, sysfs_type, fs_type;
|
||||
type sysfs_usb_c, sysfs_type, fs_type;
|
||||
|
||||
2
sepolicy/vendor/genfs_contexts
vendored
2
sepolicy/vendor/genfs_contexts
vendored
@@ -10,6 +10,8 @@ genfscon sysfs /devices/soc/soc:qcom,memlat-cpu4 u:object_r:sysfs_msm_subsy
|
||||
genfscon sysfs /android_touch u:object_r:sysfs_touch:s0
|
||||
genfscon sysfs /devices/virtual/input/ftm4_touch u:object_r:sysfs_touch:s0
|
||||
|
||||
genfscon sysfs /devices/soc/1da4000.ufshc/host0/target0:0:0/0:0:0:0 u:object_r:sysfs_scsi_devices_0000:s0
|
||||
|
||||
genfscon sysfs /class/rfkill/rfkill0/state u:object_r:sysfs_bluetooth_writable:s0
|
||||
|
||||
genfscon debugfs /kgsl/proc u:object_r:debugfs_kgsl:s0
|
||||
|
||||
7
sepolicy/vendor/hardware_info_app.te
vendored
7
sepolicy/vendor/hardware_info_app.te
vendored
@@ -13,5 +13,10 @@ allow hardware_info_app shell_data_file:dir search;
|
||||
allow hardware_info_app shell_data_file:file { open read };
|
||||
|
||||
# SysFS
|
||||
allow hardware_info_app sysfs_camera:dir search;
|
||||
allow hardware_info_app sysfs_camera:file { getattr open read };
|
||||
allow hardware_info_app sysfs_scsi_devices_0000:dir search;
|
||||
allow hardware_info_app sysfs_scsi_devices_0000:file { getattr open read };
|
||||
allow hardware_info_app sysfs_soc:dir search;
|
||||
allow hardware_info_app sysfs_soc:file { getattr open read };
|
||||
allow hardware_info_app sysfs_soc:file { getattr open read };
|
||||
|
||||
|
||||
1
sepolicy/vendor/seapp_contexts
vendored
1
sepolicy/vendor/seapp_contexts
vendored
@@ -13,6 +13,7 @@ user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_f
|
||||
# A fallback in case tango_core is missing something critical that untrusted_app provides
|
||||
user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=user
|
||||
|
||||
# Hardware Info Collection
|
||||
user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_data_file levelFrom=user
|
||||
|
||||
# Use a custom domain for GoogleCamera, to allow for Hexagon DSP access
|
||||
|
||||
1
sepolicy/vendor/ueventd.te
vendored
1
sepolicy/vendor/ueventd.te
vendored
@@ -6,6 +6,7 @@ allow ueventd sysfs_fingerprint:file w_file_perms;
|
||||
allow ueventd sysfs_graphics:file w_file_perms;
|
||||
allow ueventd sysfs_laser:file w_file_perms;
|
||||
allow ueventd sysfs_rmtfs:file w_file_perms;
|
||||
allow ueventd sysfs_scsi_devices_0000:file write;
|
||||
allow ueventd sysfs_soc:file w_file_perms;
|
||||
allow ueventd sysfs_net:file w_file_perms;
|
||||
allow ueventd sysfs_msm_subsys:file w_file_perms;
|
||||
|
||||
2
sepolicy/vendor/vold.te
vendored
2
sepolicy/vendor/vold.te
vendored
@@ -2,3 +2,5 @@
|
||||
passthrough_hal_client_domain(vold, hal_keymaster);
|
||||
|
||||
get_prop(vold, tee_listener_prop)
|
||||
|
||||
allow vold sysfs_scsi_devices_0000:file write;
|
||||
|
||||
Reference in New Issue
Block a user