storage: update sepolicy for storage suez
Bug: 206741894 Bug: 188793183 Test: boot to home Signed-off-by: Randall Huang <huangrandall@google.com> Change-Id: I206178e34156f0b02c4a5b743ac9467e7dafb74f
This commit is contained in:
parent
f317331d7a
commit
a578c846fa
7 changed files with 16 additions and 9 deletions
|
@ -3,7 +3,3 @@ dontaudit hal_health_default sysfs:file { getattr };
|
|||
dontaudit hal_health_default sysfs:file { open };
|
||||
dontaudit hal_health_default sysfs:file { read };
|
||||
dontaudit hal_health_default sysfs:file { write };
|
||||
dontaudit hal_health_default sysfs_scsi_devices_0000:dir { search };
|
||||
dontaudit hal_health_default sysfs_scsi_devices_0000:file { getattr };
|
||||
dontaudit hal_health_default sysfs_scsi_devices_0000:file { open };
|
||||
dontaudit hal_health_default sysfs_scsi_devices_0000:file { read };
|
||||
|
|
|
@ -1,11 +1,6 @@
|
|||
# b/207062564
|
||||
dontaudit hal_power_default sysfs:file { open };
|
||||
dontaudit hal_power_default sysfs:file { write };
|
||||
dontaudit hal_power_default sysfs_fs_f2fs:dir { search };
|
||||
dontaudit hal_power_default sysfs_fs_f2fs:file { open };
|
||||
dontaudit hal_power_default sysfs_fs_f2fs:file { write };
|
||||
dontaudit hal_power_default sysfs_scsi_devices_0000:file { open };
|
||||
dontaudit hal_power_default sysfs_scsi_devices_0000:file { write };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:dir { search };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:file { open };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:file { write };
|
||||
|
|
|
@ -2,3 +2,7 @@ allow hal_health_default mnt_vendor_file:dir search;
|
|||
allow hal_health_default persist_file:dir search;
|
||||
|
||||
set_prop(hal_health_default, vendor_battery_defender_prop)
|
||||
|
||||
# Access to /sys/devices/platform/14700000.ufs/*
|
||||
allow hal_health_default sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow hal_health_default sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
|
|
4
whitechapel_pro/hal_power_default.te
Normal file
4
whitechapel_pro/hal_power_default.te
Normal file
|
@ -0,0 +1,4 @@
|
|||
allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
|
||||
|
2
whitechapel_pro/hal_power_stats_default.te
Normal file
2
whitechapel_pro/hal_power_stats_default.te
Normal file
|
@ -0,0 +1,2 @@
|
|||
allow hal_power_stats_default sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow hal_power_stats_default sysfs_scsi_devices_0000:file r_file_perms;
|
|
@ -2,3 +2,7 @@ type hardware_info_app, domain;
|
|||
app_domain(hardware_info_app)
|
||||
|
||||
allow hardware_info_app app_api_service:service_manager find;
|
||||
|
||||
# Storage
|
||||
allow hardware_info_app sysfs_scsi_devices_0000:dir search;
|
||||
allow hardware_info_app sysfs_scsi_devices_0000:file r_file_perms;
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
binder_use(pixelstats_vendor)
|
||||
|
||||
allow pixelstats_vendor sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue