sepolicy: Guard debugfs rules

Allow building with PRODUCT_SET_DEBUGFS_RESTRICTIONS set.

Change-Id: I0d0703ea21f1f812c06247a3db2bc755e8904149
This commit is contained in:
Michael Bestas 2023-05-30 03:23:53 +03:00
parent 5484e1497d
commit fc9b1c6105
No known key found for this signature in database
GPG key ID: CC95044519BE6669
34 changed files with 276 additions and 61 deletions

View file

@ -44,7 +44,11 @@ ifneq (,$(filter sdm660 msm8937 msm8953 msm8996 msm8998, $(TARGET_BOARD_PLATFORM
BOARD_VENDOR_SEPOLICY_DIRS += $(SEPOLICY_PATH)/legacy/vendor/$(TARGET_SEPOLICY_DIR)
endif
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
BOARD_VENDOR_SEPOLICY_DIRS += $(SEPOLICY_PATH)/legacy/vendor/test
ifneq ($(PRODUCT_SET_DEBUGFS_RESTRICTIONS),true)
BOARD_VENDOR_SEPOLICY_DIRS += $(SEPOLICY_PATH)/legacy/vendor/common/debugfs
BOARD_VENDOR_SEPOLICY_DIRS += $(SEPOLICY_PATH)/legacy/vendor/test/debugfs
endif
BOARD_VENDOR_SEPOLICY_DIRS += $(SEPOLICY_PATH)/legacy/vendor/test
endif
endif

View file

@ -25,9 +25,11 @@
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
userdebug_or_eng(`
allow audioserver qti_debugfs:dir r_dir_perms;
allow audioserver qti_debugfs:file rw_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow audioserver qti_debugfs:dir r_dir_perms;
allow audioserver qti_debugfs:file rw_file_perms;
')
')
# Allow audioserver to read soundcard state under /proc/asound

View file

@ -41,7 +41,12 @@ allow bluetooth media_rw_data_file:file create_file_perms;
#allow proc_sysrq access for crash dump
userdebug_or_eng(`
allow bluetooth proc_sysrq:file w_file_perms;
allow bluetooth qti_debugfs:file r_file_perms;
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow bluetooth qti_debugfs:file r_file_perms;
')
')
allow bluetooth {

30
legacy/vendor/common/debugfs/file.te vendored Normal file
View file

@ -0,0 +1,30 @@
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
# * Neither the name of The Linux Foundation nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
# path to debugfs use this whic should be only used
# in debug builds
type qti_debugfs, fs_type, debugfs_type;

View file

@ -0,0 +1,28 @@
# Copyright (c) 2019-2021, The Linux Foundation. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
# * Neither the name of The Linux Foundation nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
/sys/kernel/debug/ipc_logging(/.*)? u:object_r:qti_debugfs:s0

View file

@ -0,0 +1,28 @@
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
# * Neither the name of The Linux Foundation nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
genfscon debugfs /kgsl/proc u:object_r:qti_debugfs:s0

View file

@ -74,7 +74,11 @@ allowxperm domain domain:icmp_socket ioctl { unpriv_sock_ioctls unpriv_tty_ioctl
get_prop(domain, vendor_security_patch_level_prop)
get_prop(domain, vendor_public_vendor_default_prop)
allow domain qti_debugfs:dir search;
no_debugfs_restriction(`
userdebug_or_eng(`
allow domain qti_debugfs:dir search;
')
')
# allow all context to read sysfs_kgsl
allow { domain - isolated_app } sysfs_kgsl:dir search;

View file

@ -305,10 +305,6 @@ type sysfs_laser, fs_type, sysfs_type;
# qcc-trd data files
type vendor_qcc_trd_data_file, file_type, data_file_type;
# path to debugfs use this whic should be only used
# in debug builds
type qti_debugfs, fs_type, debugfs_type;
# vendor radio files
type vendor_radio_data_file, file_type, data_file_type;

View file

@ -527,7 +527,6 @@
/sys/module/vmpressure(/.*)? u:object_r:sysfs_vmpressure:s0
/sys/board_properties/virtualkeys.synaptics_dsx u:object_r:sysfs_virtualkeys:s0
/sys/board_properties/virtualkeys.ft5x06_ts u:object_r:sysfs_virtualkeys:s0
/sys/kernel/debug/ipc_logging(/.*)? u:object_r:qti_debugfs:s0
###################################
# data files-- only vendor paths should be added

View file

@ -54,7 +54,6 @@ genfscon sysfs /devices/soc/soc:qcom,memlat-cpu2/devfreq u:object_r:sysfs_devfre
genfscon sysfs /devices/soc/soc:qcom,memlat-cpu4/devfreq u:object_r:sysfs_devfreq:s0
genfscon sysfs /devices/soc/soc:qcom,memlat-cpu6/devfreq u:object_r:sysfs_devfreq:s0
genfscon sysfs /devices/soc/soc:qcom,mincpubw/devfreq u:object_r:sysfs_devfreq:s0
genfscon debugfs /kgsl/proc u:object_r:qti_debugfs:s0
genfscon sysfs /kernel/wcd_cpe0 u:object_r:sysfs_audio:s0
genfscon sysfs /devices/virtual/thermal u:object_r:sysfs_thermal:s0
genfscon sysfs /devices/virtual/kgsl/kgsl/proc u:object_r:sysfs_kgsl_proc:s0

View file

@ -40,10 +40,14 @@ vndbinder_use(hal_audio)
userdebug_or_eng(`
diag_use(hal_audio)
#Allow access to debug fs
allow hal_audio_default debugfs:dir r_dir_perms;
allow hal_audio_default qti_debugfs:dir r_dir_perms;
allow hal_audio_default qti_debugfs:file rw_file_perms;
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow hal_audio_default debugfs:dir r_dir_perms;
allow hal_audio_default qti_debugfs:dir r_dir_perms;
allow hal_audio_default qti_debugfs:file rw_file_perms;
')
')
#Allow access to firmware

View file

@ -69,11 +69,16 @@ allow hal_bluetooth_qti ramdump_vendor_data_file:file create_file_perms;
allow hal_bluetooth_qti ramdump_vendor_data_file:dir rw_dir_perms;
allow hal_bluetooth proc_sysrq:file w_file_perms;
allow hal_bluetooth_qti qti_debugfs:file r_file_perms;
allow hal_bluetooth_qti qti_debugfs:dir rw_dir_perms;
allow hal_bluetooth_qti self:{ socket qipcrtr_socket } create_socket_perms_no_ioctl;
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow hal_bluetooth_qti qti_debugfs:file r_file_perms;
allow hal_bluetooth_qti qti_debugfs:dir rw_dir_perms;
')
')
hal_server_domain(hal_bluetooth_qti, hal_fm)
hal_server_domain(hal_bluetooth_qti, hal_btconfigstore)

View file

@ -27,10 +27,15 @@
userdebug_or_eng(`
diag_use(hal_graphics_composer)
# Allow read to /sys/kernel/debug/*
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow hal_graphics_composer qti_debugfs:dir r_dir_perms;
allow hal_graphics_composer qti_debugfs:file r_file_perms;
')
')
hal_client_domain(hal_graphics_composer_default, hal_graphics_allocator);
get_prop(hal_graphics_composer, vendor_display_prop)
allow hal_graphics_composer_default self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;

View file

@ -26,9 +26,11 @@
# # IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#debugfs access to audio
userdebug_or_eng(`
allow hal_memtrack_default qti_debugfs:dir r_dir_perms;
allow hal_memtrack_default qti_debugfs:file rw_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow hal_memtrack_default qti_debugfs:dir r_dir_perms;
allow hal_memtrack_default qti_debugfs:file rw_file_perms;
')
')
#Acess to kgsl memory /sys/class/kgsl/kgsl/proc/<pid>/mtrack

View file

@ -29,8 +29,14 @@
userdebug_or_eng(`
diag_use(hal_sensors)
get_prop(hal_sensors_default, vendor_sensors_dbg_prop)
allow hal_sensors debugfs_tracing:file { open write };
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow hal_sensors debugfs_tracing:file { open write };
')
')
set_prop(hal_sensors, vendor_slpi_prop);
allow hal_sensors self:{ socket qipcrtr_socket } create_socket_perms;
allowxperm hal_sensors self:{ socket qipcrtr_socket } ioctl msm_sock_ipc_ioctls;

View file

@ -29,8 +29,13 @@ allow kernel block_device:blk_file rw_file_perms;
userdebug_or_eng(`
allow kernel self:{ socket qipcrtr_socket } create_socket_perms_no_ioctl;
r_dir_file(kernel, qti_debugfs);
allow kernel debugfs_mmc:dir search;
')
no_debugfs_restriction(`
userdebug_or_eng(`
r_dir_file(kernel, qti_debugfs);
allow kernel debugfs_mmc:dir search;
')
')
# Access firmware_file

View file

@ -38,8 +38,12 @@ allow mediaserver camera_data_file:sock_file w_file_perms;
userdebug_or_eng(`
allow mediaserver camera_data_file:dir rw_dir_perms;
allow mediaserver camera_data_file:file create_file_perms;
# Access to audio
allow mediaserver qti_debugfs:file rw_file_perms;
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow mediaserver qti_debugfs:file rw_file_perms;
')
')
# allow poweroffhandler to binder mediaserver

View file

@ -31,8 +31,6 @@ init_daemon_domain(mm-qcamerad)
#added to support EZTune for camera
userdebug_or_eng(`
allow mm-qcamerad qti_debugfs:dir r_dir_perms;
allow mm-qcamerad qti_debugfs:file read;
#allow mm-qcamerad self:tcp_socket create_stream_socket_perms;
allow mm-qcamerad node:tcp_socket node_bind;
@ -44,6 +42,13 @@ userdebug_or_eng(`
set_prop(mm-qcamerad, camera_prop)
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow mm-qcamerad qti_debugfs:dir r_dir_perms;
allow mm-qcamerad qti_debugfs:file read;
')
')
#Communicate with user land process through domain socket
unix_socket_connect(mm-qcamerad, sensors, sensors)

View file

@ -32,16 +32,18 @@ allow perfdump_app system_app_data_file:dir create_dir_perms;
allow perfdump_app system_app_data_file:file create_file_perms;
# systrace support
allow perfdump_app debugfs_tracing:dir r_dir_perms;
allow perfdump_app debugfs_tracing:file rw_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow perfdump_app debugfs_tracing:dir r_dir_perms;
allow perfdump_app debugfs_tracing:file rw_file_perms;
userdebug_or_eng(`
allow perfdump_app debugfs_tracing_debug:dir r_dir_perms;
allow perfdump_app debugfs_tracing_debug:file rw_file_perms;
allow perfdump_app debugfs_tracing_debug:dir r_dir_perms;
allow perfdump_app debugfs_tracing_debug:file rw_file_perms;
allow perfdump_app debugfs_trace_marker:file getattr;
')
')
allow perfdump_app debugfs_trace_marker:file getattr;
# perfdump sets debug.atrace.* properties
set_prop(perfdump_app, debug_prop)

View file

@ -65,13 +65,18 @@ allow qlogd kernel:system syslog_mod;
# need for qdss log and odl from UI
userdebug_or_eng(`
allow qlogd { debugfs_tracing qdss_device }:file r_file_perms;
allow qlogd { qdss_device }:file r_file_perms;
r_dir_file(qlogd, storage_file)
r_dir_file(qlogd, mnt_user_file)
diag_use(qlogd)
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow qlogd debugfs_tracing:file r_file_perms;
')
')
# need for capture adb logs
unix_socket_connect(qlogd, logdr, logd)

View file

@ -39,7 +39,6 @@ allow qti_logkit_app surfaceflinger_service:service_manager find;
net_domain(qti_logkit_app)
userdebug_or_eng(`
# allow qti_logkit_app debugfs:file r_file_perms;
allow qti_logkit_app su:unix_dgram_socket sendto;
allow qti_logkit_app mnt_vendor_file:dir r_dir_perms;
allow qti_logkit_app sensors_persist_file:dir r_dir_perms;

View file

@ -71,10 +71,12 @@ allow vendor_qvrd fwk_sensor_hwservice:hwservice_manager find;
hal_client_domain(vendor_qvrd, hal_sensors)
# QVRD
userdebug_or_eng(`
allow vendor_qvrd debugfs:dir r_dir_perms;
allow vendor_qvrd qti_debugfs:dir r_dir_perms;
allow vendor_qvrd qti_debugfs:file rw_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow vendor_qvrd debugfs:dir r_dir_perms;
allow vendor_qvrd qti_debugfs:dir r_dir_perms;
allow vendor_qvrd qti_debugfs:file rw_file_perms;
')
')
# Allow access to kgsl sysfs nodes for performance optimization

View file

@ -41,8 +41,11 @@ net_domain(RIDL)
allow RIDL RIDL_data_file:dir create_dir_perms;
allow RIDL RIDL_data_file:file create_file_perms;
allow RIDL RIDL_data_file:lnk_file { create read unlink };
userdebug_or_eng(`
allow RIDL qti_debugfs:file read;
no_debugfs_restriction(`
userdebug_or_eng(`
allow RIDL qti_debugfs:file read;
')
')
# ver_info.txt

View file

@ -34,7 +34,6 @@ allow system_app {
}:service_manager add;
userdebug_or_eng(`
allow system_app qti_debugfs:file r_file_perms;
allow system_app su:unix_dgram_socket sendto;
# Access to tombstone segfaults
@ -44,6 +43,12 @@ userdebug_or_eng(`
')
no_debugfs_restriction(`
userdebug_or_eng(`
allow system_app qti_debugfs:file r_file_perms;
')
')
allow system_app cnd_data_file:dir w_dir_perms;
allow system_app cnd_data_file:file create_file_perms;
allow system_app bluetooth:unix_stream_socket ioctl;

30
legacy/vendor/test/debugfs/file.te vendored Normal file
View file

@ -0,0 +1,30 @@
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
# * Neither the name of The Linux Foundation nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
# /sys/kernel/debug/binder/state file
# read by system_server only in userdebug builds
type binder_state, file_type, debugfs_type;

View file

@ -0,0 +1,29 @@
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
# * Neither the name of The Linux Foundation nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
/sys/kernel/debug/dsi_dual_samsung_cmd(/.*)? u:object_r:qti_debugfs:s0
/sys/kernel/debug/binder/state u:object_r:binder_state:s0

View file

@ -25,4 +25,8 @@
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
allow dumpstate binder_state:file r_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow dumpstate binder_state:file r_file_perms;
')
')

View file

@ -27,7 +27,9 @@
#Access to power costs for testing
userdebug_or_eng(`
allow energyawareness qti_debugfs:dir r_dir_perms;
allow energyawareness qti_debugfs:file rw_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow energyawareness qti_debugfs:dir r_dir_perms;
allow energyawareness qti_debugfs:file rw_file_perms;
')
')

View file

@ -31,9 +31,5 @@ type vendor_gles_data_file, file_type, data_file_type;
# To allow GPU application to read "/data/misc/gpu" path
type system_gles_data_file, core_data_file_type, file_type, data_file_type;
# /sys/kernel/debug/binder/state file
# read by system_server only in userdebug builds
type binder_state, file_type, debugfs_type;
# sensors data file type for script access by test apps
type sensors_data_file, file_type, data_file_type, core_data_file_type;

View file

@ -93,7 +93,6 @@
/(vendor|system/vendor)/bin/sns.* u:object_r:sensors_test_exec:s0
#for testscripts support
/(vendor|system/vendor)/bin/init\.qcom\.vendor\.testscripts\.sh u:object_r:vendor-qti-testscripts_exec:s0
/sys/kernel/debug/dsi_dual_samsung_cmd(/.*)? u:object_r:qti_debugfs:s0
#Context for GPU applications
/data/vendor/gpu(/.*)? u:object_r:vendor_gles_data_file:s0
@ -101,7 +100,5 @@
#Used only in debug build to enable gpu config settings
/data/misc/gpu(/.*)? u:object_r:system_gles_data_file:s0
/sys/kernel/debug/binder/state u:object_r:binder_state:s0
# Sensors scripts for test app
/data/sensors/scripts(/.*)? u:object_r:sensors_data_file:s0

View file

@ -25,5 +25,8 @@
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
allow init binder_state:file r_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow init binder_state:file r_file_perms;
')
')

View file

@ -25,4 +25,8 @@
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
allow system_server binder_state:file r_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow system_server binder_state:file r_file_perms;
')
')

View file

@ -25,5 +25,8 @@
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
allow vendor_init binder_state:file r_file_perms;
no_debugfs_restriction(`
userdebug_or_eng(`
allow vendor_init binder_state:file r_file_perms;
')
')