device_lenovo_sdm710-common/sepolicy/vendor/hal_power_default.te
Hridya Valsaraju 8803ff0740
sdm710-common: Set PRODUCT_SET_DEBUGFS_RESTRICTIONS
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.

Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
2023-11-25 20:35:07 +02:00

35 lines
No EOL
1.4 KiB
Text

allow hal_power_default input_device:dir r_dir_perms;
allow hal_power_default input_device:chr_file rw_file_perms;
allow hal_power_default sysfs_graphics:dir search;
allow hal_power_default sysfs_graphics:file r_file_perms;
allow hal_power_default sysfs_kgsl:lnk_file rw_file_perms;
allow hal_power_default sysfs_kgsl:file rw_file_perms;
allow hal_power_default sysfs_devfreq:dir search;
allow hal_power_default sysfs_devfreq:file rw_file_perms;
# To do powerhint on nodes defined in powerhint.json
allow hal_power_default sysfs_msm_subsys:dir search;
allow hal_power_default sysfs_msm_subsys:file rw_file_perms;
allow hal_power_default sysfs_devices_system_cpu:file rw_file_perms;
allow hal_power_default device_latency:chr_file rw_file_perms;
allow hal_power_default cgroup:dir search;
allow hal_power_default cgroup:file rw_file_perms;
allow hal_power_default proc_sysctl_schedboost:file rw_file_perms;
# Allow power hal to talk to mm-pp-daemon to control display lpm
allow hal_power_default mm-pp-daemon:unix_stream_socket connectto;
allow hal_power_default pps_socket:sock_file write;
# To get/set powerhal state property
set_prop(hal_power_default, vendor_power_prop)
# Rule for hal_power_default to access graphics composer process
unix_socket_connect(hal_power_default, pps, hal_graphics_composer_default);
r_dir_file(hal_power_default, sysfs_tp)
allow hal_power_default sysfs_tp:file write;
# Allow power hal to access proc
allow hal_power_default proc:file { open };