fix sysfs_vendor_sched access
Bug: 207062776 Bug: 207062777 Bug: 207062877 Bug: 207062211 Bug: 207062232 Bug: 207062208 Test: boot with no relevant access Change-Id: I585653383ad0061fc6e9669c0590432c235f7e14
This commit is contained in:
parent
c90030d1f7
commit
ed245711ec
9 changed files with 3 additions and 18 deletions
|
@ -1,6 +1,3 @@
|
|||
# b/207062564
|
||||
dontaudit hal_power_default sysfs:file { open };
|
||||
dontaudit hal_power_default sysfs:file { write };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:dir { search };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:file { open };
|
||||
dontaudit hal_power_default sysfs_vendor_sched:file { write };
|
||||
|
|
|
@ -1,3 +0,0 @@
|
|||
# b/207062776
|
||||
dontaudit init sysfs_vendor_sched:file { open };
|
||||
dontaudit init sysfs_vendor_sched:file { write };
|
|
@ -1,2 +0,0 @@
|
|||
# b/207062777
|
||||
dontaudit logd sysfs_vendor_sched:dir { search };
|
|
@ -1,2 +0,0 @@
|
|||
# b/207062877
|
||||
dontaudit logpersist sysfs_vendor_sched:dir { search };
|
|
@ -4,5 +4,3 @@ dontaudit surfaceflinger kernel:process { setsched };
|
|||
dontaudit surfaceflinger vendor_fw_file:dir { search };
|
||||
dontaudit surfaceflinger vendor_fw_file:file { open };
|
||||
dontaudit surfaceflinger vendor_fw_file:file { read };
|
||||
# b/207062211
|
||||
dontaudit surfaceflinger sysfs_vendor_sched:dir { search };
|
||||
|
|
|
@ -1,2 +0,0 @@
|
|||
# b/207062232
|
||||
dontaudit untrusted_app_30 sysfs_vendor_sched:dir { search };
|
|
@ -1,4 +0,0 @@
|
|||
# b/207062208
|
||||
dontaudit zygote sysfs_vendor_sched:dir { search };
|
||||
dontaudit zygote sysfs_vendor_sched:file { open };
|
||||
dontaudit zygote sysfs_vendor_sched:file { write };
|
2
whitechapel_pro/domain.te
Normal file
2
whitechapel_pro/domain.te
Normal file
|
@ -0,0 +1,2 @@
|
|||
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
|
1
whitechapel_pro/untrusted_app_all.te
Normal file
1
whitechapel_pro/untrusted_app_all.te
Normal file
|
@ -0,0 +1 @@
|
|||
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
Loading…
Add table
Add a link
Reference in a new issue