Set SEPolicy for the disable_contaminant_detection script
This patch ports Zuma project SEPolicy and corrects the platform device name. init : Command 'exec /vendor/bin/hw/disable_contaminant_detection.sh' action=vendor.usb.contaminantdisable=true (/vendor/etc/init/hw/ init.zumapro.usb.rc:288) took 5ms and failed: Could not start exec service: File /vendor/bin/hw/disable_contaminant_detection.sh(labeled "u:object_r:vendor_file:s0") has incorrect label or no domain transition from u:r:init:s0 to another SELinux domain defined. Have you configured your service correctly? https://source.android.com/security/selinux/device-policy# label_new_services_and_address_denials. Note: this error shows up even in permissive mode in order to make auditing denials possible. Bug: 295127978 Test: manual test Change-Id: I4269127f0101250615aad9218a9e2684579a653b Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
This commit is contained in:
parent
24ad0c2d7f
commit
25748e9d93
3 changed files with 11 additions and 0 deletions
1
vendor/file_contexts
vendored
1
vendor/file_contexts
vendored
|
@ -26,6 +26,7 @@
|
|||
/vendor/bin/hw/qfp-daemon u:object_r:hal_fingerprint_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.goodix u:object_r:hal_fingerprint_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint-service\.goodix u:object_r:hal_fingerprint_default_exec:s0
|
||||
/vendor/bin/hw/disable_contaminant_detection\.sh u:object_r:disable-contaminant-detection-sh_exec:s0
|
||||
|
||||
# Vendor libraries
|
||||
/vendor/lib64/libdrm\.so u:object_r:same_process_hal_file:s0
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue