author | Pengfei Zhao <pengfei.zhao@amlogic.com> | 2020-11-24 08:09:57 (GMT) |
---|---|---|
committer | Tellen Yu <tellen.yu@amlogic.com> | 2020-11-24 11:38:56 (GMT) |
commit | da55a8557bb97e8d811ae42cc91ef821a2eff1f3 (patch) | |
tree | adbb7bf791960433dde91b914219839d5357e74c | |
parent | 5a543fd630336a9b7c6e45d1a73f44774bc7b15e (diff) | |
download | common-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.zip common-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.tar.gz common-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.tar.bz2 |
CTS:fix CtsSecurityHostTestCases cases [1/1]
PD#SWPL-37506
Problem:
android.security.cts.SELinuxHostTest#testNoBugreportDenials
Solution:
add selinux permission
Verify:
ohm
Signed-off-by: Pengfei Zhao <pengfei.zhao@amlogic.com>
Change-Id: Ib4184e0dbe18e3d75136c52699956ea70049e658
-rw-r--r-- | sepolicy/dumpstate.te | 2 | ||||
-rw-r--r-- | sepolicy/file_contexts | 1 | ||||
-rw-r--r-- | sepolicy/hal_dumpstate_default.te | 1 |
3 files changed, 4 insertions, 0 deletions
diff --git a/sepolicy/dumpstate.te b/sepolicy/dumpstate.te index 49cd63b..ffa8b8a 100644 --- a/sepolicy/dumpstate.te +++ b/sepolicy/dumpstate.te @@ -3,3 +3,5 @@ allow dumpstate incidentd:binder call; allow dumpstate param_tv_file:dir { getattr search }; allow dumpstate tee_vendor_file:dir { getattr search }; allow dumpstate sysfs_module:file { read open getattr }; +allow dumpstate hal_light_default:binder call; +allow dumpstate hal_power_default:binder call; diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts index f7fa927..fdebf7b 100644 --- a/sepolicy/file_contexts +++ b/sepolicy/file_contexts @@ -215,6 +215,7 @@ # for android.security.cts.SELinuxHostTest#testNoBugreportDenials /sys/devices/platform(/.*)?\.emmc/mmc_host/emmc/emmc:0001/block/mmcblk0(/.*)? u:object_r:sysfs_devices_block:s0 +/sys/devices/platform/soc(/.*)?\.mmc/mmc_host/mmc1/mmc1:0001/block/mmcblk1(/.*)? u:object_r:sysfs_devices_block:s0 /sys/devices/virtual/net(/.*)? u:object_r:sysfs_net:s0 /sys/class/hdmirx/hdmirx0/edid u:object_r:sysfs_cec:s0 diff --git a/sepolicy/hal_dumpstate_default.te b/sepolicy/hal_dumpstate_default.te index 558c365..9e4aad5 100644 --- a/sepolicy/hal_dumpstate_default.te +++ b/sepolicy/hal_dumpstate_default.te @@ -13,5 +13,6 @@ allow hal_dumpstate_default vendor_shell_exec:file rx_file_perms; allow hal_dumpstate_default vendor_toolbox_exec:file rx_file_perms; allow hal_dumpstate_default graphics_device:dir search; +allow hal_dumpstate_default sysfs_audio_cap:file r_file_perms; # Access to vendor logging property set_prop(hal_dumpstate_default, vendor_logging_prop) |