[DO NOT MERGE] Add sepolicy for procfs_touch_gti type am: 946b7e5e36

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/20811209

Change-Id: Ifdfe12568635a069098a085f247ff8502aa76189
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
Super Liu 2023-01-09 01:34:28 +00:00 committed by Automerger Merge Worker
commit b705c1a215
4 changed files with 7 additions and 0 deletions

View file

@ -112,8 +112,10 @@ type sysfs_usbc_throttling_stats, sysfs_type, fs_type;
# Touch
type proc_touch, proc_type, fs_type;
type proc_touch_gti, proc_type, fs_type;
userdebug_or_eng(`
typeattribute proc_touch mlstrustedobject;
typeattribute proc_touch_gti mlstrustedobject;
')
# Vendor sched files

View file

@ -31,6 +31,7 @@ genfscon sysfs /devices/soc0/revision u
genfscon sysfs /devices/platform/10d10000.spi/spi_master/spi0/spi0.0/synaptics_tcm.0/sysfs u:object_r:sysfs_touch:s0
genfscon sysfs /devices/virtual/sec/tsp u:object_r:sysfs_touch:s0
genfscon proc /focaltech_touch u:object_r:proc_touch:s0
genfscon proc /goog_touch_interface u:object_r:proc_touch_gti:s0
# tracefs
genfscon tracefs /events/dmabuf_heap/dma_heap_stat u:object_r:debugfs_tracing:s0

View file

@ -8,4 +8,5 @@ userdebug_or_eng(`
allow google_touch_app sysfs_touch:dir r_dir_perms;
allow google_touch_app sysfs_touch:file rw_file_perms;
allow google_touch_app proc_touch:file rw_file_perms;
allow google_touch_app proc_touch_gti:file rw_file_perms;
')

View file

@ -84,6 +84,9 @@ allow hal_dumpstate_default sysfs_touch:file rw_file_perms;
allow hal_dumpstate_default proc_touch:dir r_dir_perms;
allow hal_dumpstate_default proc_touch:file rw_file_perms;
allow hal_dumpstate_default proc_touch_gti:dir r_dir_perms;
allow hal_dumpstate_default proc_touch_gti:file rw_file_perms;
allow hal_dumpstate_default vendor_displaycolor_service:service_manager find;
binder_call(hal_dumpstate_default, hal_graphics_composer_default);
allow hal_dumpstate_default sysfs_display:dir r_dir_perms;