Allow the sensor HAL to access dynamic sensor properties.
Bug: 195964858 Test: Verified dynamic sensor manager is present in sensor list and that no SELinux violations occur on sc-v2-dev and master. Test: See details in testing done comment in https://googleplex-android-review.git.corp.google.com/15905607 . Change-Id: I2f1c05ec0d840f6ebae1e5356f668b3f9431fd25
This commit is contained in:
@@ -49,6 +49,9 @@ allow hal_sensors_default sysfs_aoc_reset:file rw_file_perms;
|
||||
# Allow sensor HAL to read AoC dumpstate.
|
||||
allow hal_sensors_default sysfs_aoc_dumpstate:file r_file_perms;
|
||||
|
||||
# Allow access for dynamic sensor properties.
|
||||
get_prop(hal_sensors_default, vendor_dynamic_sensor_prop)
|
||||
|
||||
#
|
||||
# Suez type enforcements.
|
||||
#
|
||||
|
||||
4
whitechapel/vendor/google/property.te
vendored
4
whitechapel/vendor/google/property.te
vendored
@@ -49,3 +49,7 @@ vendor_internal_prop(vendor_tcpdump_log_prop)
|
||||
|
||||
# Fingerprint
|
||||
vendor_internal_prop(vendor_fingerprint_fake_prop)
|
||||
|
||||
# Dynamic sensor
|
||||
vendor_internal_prop(vendor_dynamic_sensor_prop)
|
||||
|
||||
|
||||
4
whitechapel/vendor/google/property_contexts
vendored
4
whitechapel/vendor/google/property_contexts
vendored
@@ -104,3 +104,7 @@ vendor.tcpdump.output.dir u:object_r:vendor_tcpdump_log_pr
|
||||
|
||||
# Fingerprint
|
||||
vendor.fingerprint.disable.fake u:object_r:vendor_fingerprint_fake_prop:s0
|
||||
|
||||
# Dynamic sensor
|
||||
vendor.dynamic_sensor. u:object_r:vendor_dynamic_sensor_prop:s0
|
||||
|
||||
|
||||
Reference in New Issue
Block a user