Allow the sensor HAL to access dynamic sensor properties.
Bug: 195964858 Test: Verified dynamic sensor manager is present in sensor list and that no SELinux violations occur on sc-v2-dev and master. Test: See details in testing done comment in https://googleplex-android-review.git.corp.google.com/15905607 . Change-Id: I2f1c05ec0d840f6ebae1e5356f668b3f9431fd25
This commit is contained in:
parent
aef1a206a7
commit
e42a4ed3be
3 changed files with 11 additions and 0 deletions
|
@ -49,6 +49,9 @@ allow hal_sensors_default sysfs_aoc_reset:file rw_file_perms;
|
|||
# Allow sensor HAL to read AoC dumpstate.
|
||||
allow hal_sensors_default sysfs_aoc_dumpstate:file r_file_perms;
|
||||
|
||||
# Allow access for dynamic sensor properties.
|
||||
get_prop(hal_sensors_default, vendor_dynamic_sensor_prop)
|
||||
|
||||
#
|
||||
# Suez type enforcements.
|
||||
#
|
||||
|
|
4
whitechapel/vendor/google/property.te
vendored
4
whitechapel/vendor/google/property.te
vendored
|
@ -49,3 +49,7 @@ vendor_internal_prop(vendor_tcpdump_log_prop)
|
|||
|
||||
# Fingerprint
|
||||
vendor_internal_prop(vendor_fingerprint_fake_prop)
|
||||
|
||||
# Dynamic sensor
|
||||
vendor_internal_prop(vendor_dynamic_sensor_prop)
|
||||
|
||||
|
|
4
whitechapel/vendor/google/property_contexts
vendored
4
whitechapel/vendor/google/property_contexts
vendored
|
@ -104,3 +104,7 @@ vendor.tcpdump.output.dir u:object_r:vendor_tcpdump_log_pr
|
|||
|
||||
# Fingerprint
|
||||
vendor.fingerprint.disable.fake u:object_r:vendor_fingerprint_fake_prop:s0
|
||||
|
||||
# Dynamic sensor
|
||||
vendor.dynamic_sensor. u:object_r:vendor_dynamic_sensor_prop:s0
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue