WLC: Add required sysfs_wlc sepolicies

The sysfs_wlc is still required for certain services like
hal_health_default. Add these sepolicies to pass the tests.

Bug: 267171670
Change-Id: Ic4dca7a34e8ed9b096a650b1df4bb58290425117
Signed-off-by: Ken Yang <yangken@google.com>
This commit is contained in:
Ken Yang 2023-01-31 15:02:51 +00:00
parent 0485b4848f
commit fcb9c033a1
5 changed files with 11 additions and 0 deletions

View file

@ -37,6 +37,7 @@ allow hal_sensors_default sysfs_leds:file rw_file_perms;
# Allow access to the power supply files for MagCC.
r_dir_file(hal_sensors_default, sysfs_batteryinfo)
allow hal_sensors_default sysfs_wlc:dir r_dir_perms;
# Allow access to sensor service for sensor_listener.
binder_call(hal_sensors_default, system_server);

View file

@ -13,6 +13,10 @@ vndbinder_use(hal_dumpstate_default)
allow hal_dumpstate_default vendor_gps_file:dir r_dir_perms;
allow hal_dumpstate_default vendor_gps_file:file r_file_perms;
allow hal_dumpstate_default sysfs_wlc:dir search;
allow hal_dumpstate_default sysfs_wlc:dir r_dir_perms;
allow hal_dumpstate_default sysfs_wlc:file r_file_perms;
allow hal_dumpstate_default shell_data_file:file getattr;
allow hal_dumpstate_default radio_vendor_data_file:dir create_dir_perms;

View file

@ -14,3 +14,5 @@ allow hal_health_default sysfs_thermal:dir search;
allow hal_health_default sysfs_thermal:file w_file_perms;
allow hal_health_default sysfs_thermal:lnk_file read;
allow hal_health_default thermal_link_device:dir search;
allow hal_health_default sysfs_wlc:dir search;

View file

@ -10,6 +10,9 @@ allow pixelstats_vendor fwk_stats_service:service_manager find;
allow pixelstats_vendor sysfs_scsi_devices_0000:file rw_file_perms;
allow pixelstats_vendor sysfs_pixelstats:file r_file_perms;
# Wireless charge
allow pixelstats_vendor sysfs_wlc:dir search;
allow pixelstats_vendor sysfs_wlc:file rw_file_perms;
# Pca charge
allow pixelstats_vendor sysfs_pca:file rw_file_perms;

View file

@ -8,3 +8,4 @@ userdebug_or_eng(`
dontaudit shell proc_vendor_sched:dir search;
dontaudit shell proc_vendor_sched:file write;
dontaudit shell sysfs_wlc:dir search;