diff options
author | Steve Pfetsch <spfetsch@google.com> | 2023-09-21 20:14:24 +0000 |
---|---|---|
committer | Android (Google) Code Review <android-gerrit@google.com> | 2023-09-21 20:14:24 +0000 |
commit | 8b350cc57dc21d656d402d622b0ee7adff7637bf (patch) | |
tree | c0a6723430e325330c04faa85ec802731bc29c52 | |
parent | ae8f93dfb9f7b402c2f68430d15baf0deab24e45 (diff) | |
parent | ab8704311758d52659c0a34bd1dc3779af3c7f2b (diff) | |
download | shusky-sepolicy-8b350cc57dc21d656d402d622b0ee7adff7637bf.tar.gz |
Merge "DiagnosticsTool permissions for accessing touch calibration interface" into udc-qpr-dev
-rw-r--r-- | husky-sepolicy.mk | 2 | ||||
-rw-r--r-- | shiba-sepolicy.mk | 2 | ||||
-rw-r--r-- | tracking_denials/file.te | 2 | ||||
-rw-r--r-- | tracking_denials/priv_app.te | 4 |
4 files changed, 10 insertions, 0 deletions
diff --git a/husky-sepolicy.mk b/husky-sepolicy.mk index 1a8c79b..73742a8 100644 --- a/husky-sepolicy.mk +++ b/husky-sepolicy.mk @@ -1,3 +1,5 @@ # sepolicy exclusively for husky. BOARD_SEPOLICY_DIRS += device/google/shusky-sepolicy/husky +# unresolved SELinux error log with bug tracking +BOARD_SEPOLICY_DIRS += device/google/shusky-sepolicy/tracking_denials diff --git a/shiba-sepolicy.mk b/shiba-sepolicy.mk index 23f811f..114c114 100644 --- a/shiba-sepolicy.mk +++ b/shiba-sepolicy.mk @@ -1,3 +1,5 @@ # sepolicy exclusively for shiba. BOARD_SEPOLICY_DIRS += device/google/shusky-sepolicy/shiba +# unresolved SELinux error log with bug tracking +BOARD_SEPOLICY_DIRS += device/google/shusky-sepolicy/tracking_denials diff --git a/tracking_denials/file.te b/tracking_denials/file.te new file mode 100644 index 0000000..e348a15 --- /dev/null +++ b/tracking_denials/file.te @@ -0,0 +1,2 @@ +# b/301300623 +typeattribute sysfs_touch_gti mlstrustedobject; diff --git a/tracking_denials/priv_app.te b/tracking_denials/priv_app.te new file mode 100644 index 0000000..6e25d2e --- /dev/null +++ b/tracking_denials/priv_app.te @@ -0,0 +1,4 @@ +# b/301300623 +allow priv_app app_api_service:service_manager find; +allow priv_app sysfs_touch_gti:file rw_file_perms; +allow priv_app sysfs_touch_gti:file { getattr open read write }; |