57fdca22c4
Starting with Android R launched devices, debugfs cannot be mounted in production builds. In order to avoid accidental debugfs dependencies from creeping in during development with userdebug/eng builds, the build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to enforce additional debugfs restrictions for userdebug/eng builds. The same flag will be used to enable sepolicy neveallow statements to prevent new permissions added for debugfs access. Test: build, boot Bug: 184381659 Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
35 lines
No EOL
1.4 KiB
Text
35 lines
No EOL
1.4 KiB
Text
allow hal_power_default input_device:dir r_dir_perms;
|
|
allow hal_power_default input_device:chr_file rw_file_perms;
|
|
|
|
allow hal_power_default sysfs_graphics:dir search;
|
|
allow hal_power_default sysfs_graphics:file r_file_perms;
|
|
|
|
allow hal_power_default sysfs_kgsl:lnk_file rw_file_perms;
|
|
allow hal_power_default sysfs_kgsl:file rw_file_perms;
|
|
allow hal_power_default sysfs_devfreq:dir search;
|
|
allow hal_power_default sysfs_devfreq:file rw_file_perms;
|
|
|
|
# To do powerhint on nodes defined in powerhint.json
|
|
allow hal_power_default sysfs_msm_subsys:dir search;
|
|
allow hal_power_default sysfs_msm_subsys:file rw_file_perms;
|
|
allow hal_power_default sysfs_devices_system_cpu:file rw_file_perms;
|
|
allow hal_power_default device_latency:chr_file rw_file_perms;
|
|
allow hal_power_default cgroup:dir search;
|
|
allow hal_power_default cgroup:file rw_file_perms;
|
|
allow hal_power_default proc_sysctl_schedboost:file rw_file_perms;
|
|
|
|
# Allow power hal to talk to mm-pp-daemon to control display lpm
|
|
allow hal_power_default mm-pp-daemon:unix_stream_socket connectto;
|
|
allow hal_power_default pps_socket:sock_file write;
|
|
|
|
# To get/set powerhal state property
|
|
set_prop(hal_power_default, vendor_power_prop)
|
|
|
|
# Rule for hal_power_default to access graphics composer process
|
|
unix_socket_connect(hal_power_default, pps, hal_graphics_composer_default);
|
|
|
|
r_dir_file(hal_power_default, sysfs_tp)
|
|
allow hal_power_default sysfs_tp:file write;
|
|
|
|
# Allow power hal to access proc
|
|
allow hal_power_default proc:file { open }; |