sched: move sysfs to procfs am: 4fa67857c3
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17346963 Change-Id: Ib855e5bdf15d24defa55f3b548144fd31ed96ecb
This commit is contained in:
commit
9bff8c59b6
10 changed files with 18 additions and 18 deletions
|
@ -1,2 +1,2 @@
|
|||
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
allow bluetooth sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow bluetooth sysfs_vendor_sched:file w_file_perms;
|
||||
allow bluetooth proc_vendor_sched:dir r_dir_perms;
|
||||
allow bluetooth proc_vendor_sched:file w_file_perms;
|
|
@ -1,2 +1,2 @@
|
|||
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;
|
||||
|
|
|
@ -2,7 +2,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
|
|||
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
|
||||
allow hal_power_default sysfs_display:file rw_file_perms;
|
||||
allow hal_power_default sysfs_vendor_sched:file r_file_perms;
|
||||
allow hal_power_default proc_vendor_sched:file r_file_perms;
|
||||
allow hal_power_default sysfs_gpu:file rw_file_perms;
|
||||
allow hal_power_default sysfs_fabric:file rw_file_perms;
|
||||
allow hal_power_default sysfs_camera:file rw_file_perms;
|
||||
|
|
|
@ -2,8 +2,8 @@ type hbmsvmanager_app, domain;
|
|||
|
||||
app_domain(hbmsvmanager_app);
|
||||
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
|
||||
binder_call(hbmsvmanager_app, hal_graphics_composer_default)
|
||||
|
|
|
@ -24,6 +24,6 @@ userdebug_or_eng(`
|
|||
set_prop(logger_app, vendor_wifi_sniffer_prop)
|
||||
|
||||
dontaudit logger_app default_prop:file r_file_perms;
|
||||
dontaudit logger_app sysfs_vendor_sched:dir search;
|
||||
dontaudit logger_app sysfs_vendor_sched:file write;
|
||||
dontaudit logger_app proc_vendor_sched:dir search;
|
||||
dontaudit logger_app proc_vendor_sched:file write;
|
||||
')
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
allow nfc sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow nfc sysfs_vendor_sched:file w_file_perms;
|
||||
allow nfc proc_vendor_sched:dir r_dir_perms;
|
||||
allow nfc proc_vendor_sched:file w_file_perms;
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
allow platform_app hal_pixel_display_service:service_manager find;
|
||||
allow platform_app hal_wlc_hwservice:hwservice_manager find;
|
||||
allow platform_app nfc_service:service_manager find;
|
||||
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow platform_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
# Fingerprint (UDFPS) GHBM/LHBM toggle
|
||||
get_prop(platform_app, fingerprint_ghbm_prop)
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
allow radio sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow radio sysfs_vendor_sched:file w_file_perms;
|
||||
allow radio proc_vendor_sched:dir r_dir_perms;
|
||||
allow radio proc_vendor_sched:file w_file_perms;
|
|
@ -1 +1 @@
|
|||
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
||||
dontaudit untrusted_app_all proc_vendor_sched:dir search;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue