Allow the sensor HAL to access dynamic sensor properties. am: fba4a09331
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15874927 Change-Id: I9022c4d8e270af3a0d369692a6996dd046c732c4
This commit is contained in:
commit
9cadbdc347
3 changed files with 11 additions and 0 deletions
|
@ -49,6 +49,9 @@ allow hal_sensors_default sysfs_aoc_reset:file rw_file_perms;
|
|||
# Allow sensor HAL to read AoC dumpstate.
|
||||
allow hal_sensors_default sysfs_aoc_dumpstate:file r_file_perms;
|
||||
|
||||
# Allow access for dynamic sensor properties.
|
||||
get_prop(hal_sensors_default, vendor_dynamic_sensor_prop)
|
||||
|
||||
#
|
||||
# Suez type enforcements.
|
||||
#
|
||||
|
|
4
whitechapel/vendor/google/property.te
vendored
4
whitechapel/vendor/google/property.te
vendored
|
@ -49,3 +49,7 @@ vendor_internal_prop(vendor_tcpdump_log_prop)
|
|||
|
||||
# Fingerprint
|
||||
vendor_internal_prop(vendor_fingerprint_fake_prop)
|
||||
|
||||
# Dynamic sensor
|
||||
vendor_internal_prop(vendor_dynamic_sensor_prop)
|
||||
|
||||
|
|
4
whitechapel/vendor/google/property_contexts
vendored
4
whitechapel/vendor/google/property_contexts
vendored
|
@ -104,3 +104,7 @@ vendor.tcpdump.output.dir u:object_r:vendor_tcpdump_log_pr
|
|||
|
||||
# Fingerprint
|
||||
vendor.fingerprint.disable.fake u:object_r:vendor_fingerprint_fake_prop:s0
|
||||
|
||||
# Dynamic sensor
|
||||
vendor.dynamic_sensor. u:object_r:vendor_dynamic_sensor_prop:s0
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue