summaryrefslogtreecommitdiff
authorPengfei Zhao <pengfei.zhao@amlogic.com>2020-11-24 08:09:57 (GMT)
committer Tellen Yu <tellen.yu@amlogic.com>2020-11-24 11:38:56 (GMT)
commitda55a8557bb97e8d811ae42cc91ef821a2eff1f3 (patch)
treeadbb7bf791960433dde91b914219839d5357e74c
parent5a543fd630336a9b7c6e45d1a73f44774bc7b15e (diff)
downloadcommon-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.zip
common-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.tar.gz
common-da55a8557bb97e8d811ae42cc91ef821a2eff1f3.tar.bz2
CTS:fix CtsSecurityHostTestCases cases [1/1]
PD#SWPL-37506 Problem: android.security.cts.SELinuxHostTest#testNoBugreportDenials Solution: add selinux permission Verify: ohm Signed-off-by: Pengfei Zhao <pengfei.zhao@amlogic.com> Change-Id: Ib4184e0dbe18e3d75136c52699956ea70049e658
Diffstat
-rw-r--r--sepolicy/dumpstate.te2
-rw-r--r--sepolicy/file_contexts1
-rw-r--r--sepolicy/hal_dumpstate_default.te1
3 files changed, 4 insertions, 0 deletions
diff --git a/sepolicy/dumpstate.te b/sepolicy/dumpstate.te
index 49cd63b..ffa8b8a 100644
--- a/sepolicy/dumpstate.te
+++ b/sepolicy/dumpstate.te
@@ -3,3 +3,5 @@ allow dumpstate incidentd:binder call;
allow dumpstate param_tv_file:dir { getattr search };
allow dumpstate tee_vendor_file:dir { getattr search };
allow dumpstate sysfs_module:file { read open getattr };
+allow dumpstate hal_light_default:binder call;
+allow dumpstate hal_power_default:binder call;
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts
index f7fa927..fdebf7b 100644
--- a/sepolicy/file_contexts
+++ b/sepolicy/file_contexts
@@ -215,6 +215,7 @@
# for android.security.cts.SELinuxHostTest#testNoBugreportDenials
/sys/devices/platform(/.*)?\.emmc/mmc_host/emmc/emmc:0001/block/mmcblk0(/.*)? u:object_r:sysfs_devices_block:s0
+/sys/devices/platform/soc(/.*)?\.mmc/mmc_host/mmc1/mmc1:0001/block/mmcblk1(/.*)? u:object_r:sysfs_devices_block:s0
/sys/devices/virtual/net(/.*)? u:object_r:sysfs_net:s0
/sys/class/hdmirx/hdmirx0/edid u:object_r:sysfs_cec:s0
diff --git a/sepolicy/hal_dumpstate_default.te b/sepolicy/hal_dumpstate_default.te
index 558c365..9e4aad5 100644
--- a/sepolicy/hal_dumpstate_default.te
+++ b/sepolicy/hal_dumpstate_default.te
@@ -13,5 +13,6 @@ allow hal_dumpstate_default vendor_shell_exec:file rx_file_perms;
allow hal_dumpstate_default vendor_toolbox_exec:file rx_file_perms;
allow hal_dumpstate_default graphics_device:dir search;
+allow hal_dumpstate_default sysfs_audio_cap:file r_file_perms;
# Access to vendor logging property
set_prop(hal_dumpstate_default, vendor_logging_prop)