Merge "[ALPS03841705] AEE porting on Android P" into alps-trunk-p0.basic
Change-Id: Ie88c8fb29e6e51f122cb41103b6807dc9486b8a5 MTK-Commit-Id: 17ddd9047c584201262777a2b7209980d600ab49
This commit is contained in:
commit
a94ac3e353
@ -47,3 +47,6 @@ allow aee_aed proc_lk_env:file rw_file_perms;
|
|||||||
|
|
||||||
# Purpose: Allow aee_aedv to read /proc/pid/exe
|
# Purpose: Allow aee_aedv to read /proc/pid/exe
|
||||||
allow aee_aed exec_type:file r_file_perms;
|
allow aee_aed exec_type:file r_file_perms;
|
||||||
|
|
||||||
|
# Purpose: Allow aee_aedv to read /proc/cpu/alignment
|
||||||
|
allow aee_aed proc_cpu_alignment:file { write open };
|
||||||
|
@ -356,3 +356,39 @@ allow aee_aedv sysfs_lowmemorykiller:file r_file_perms;
|
|||||||
# Purpose: Allow aee read /sys/class/misc/scp/scp_dump
|
# Purpose: Allow aee read /sys/class/misc/scp/scp_dump
|
||||||
allow aee_aedv sysfs_scp:dir r_dir_perms;
|
allow aee_aedv sysfs_scp:dir r_dir_perms;
|
||||||
allow aee_aedv sysfs_scp:file r_file_perms;
|
allow aee_aedv sysfs_scp:file r_file_perms;
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv self to fsetid/sys_nice/chown/fowner
|
||||||
|
allow aee_aedv self:capability { fsetid sys_nice chown fowner };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/buddyinfo
|
||||||
|
allow aee_aedv proc_buddyinfo:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/cmdline
|
||||||
|
allow aee_aedv proc_cmdline:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/slabinfo
|
||||||
|
allow aee_aedv proc_slabinfo:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/stat
|
||||||
|
allow aee_aedv proc_stat:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/version
|
||||||
|
allow aee_aedv proc_version:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/vmallocinfo
|
||||||
|
allow aee_aedv proc_vmallocinfo:file { read open };
|
||||||
|
|
||||||
|
# Purpose: allow aee_aedv to read /proc/vmstat
|
||||||
|
allow aee_aedv proc_vmstat:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_aedv to read /proc/cpu/alignment
|
||||||
|
allow aee_aedv proc_cpu_alignment:file { write open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_aedv to read /proc/gpulog
|
||||||
|
allow aee_aedv proc_gpulog:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_aedv to read /proc/chip/hw_ver
|
||||||
|
allow aee_aedv proc_hw_ver:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_aedv to read /proc/sched_debug
|
||||||
|
allow aee_aedv proc_sched_debug:file { read open };
|
||||||
|
@ -89,3 +89,21 @@ allow dumpstate gpu_device:dir search;
|
|||||||
|
|
||||||
# Purpose: Allow aee_dumpstate to invoke "lshal debug <interface>", where <interface> is "ICameraProvider".
|
# Purpose: Allow aee_dumpstate to invoke "lshal debug <interface>", where <interface> is "ICameraProvider".
|
||||||
allow dumpstate mtk_hal_camera:binder { call };
|
allow dumpstate mtk_hal_camera:binder { call };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to read /proc/slabinfo
|
||||||
|
allow dumpstate proc_slabinfo:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to read /proc/zraminfo
|
||||||
|
allow dumpstate proc_zraminfo:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to write /sys/devices/virtual/timed_output/vibrator/enable
|
||||||
|
allow dumpstate sysfs_vibrator:file write;
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to read /proc/gpulog
|
||||||
|
allow dumpstate proc_gpulog:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to read /proc/sched_debug
|
||||||
|
allow dumpstate proc_sched_debug:file { read open };
|
||||||
|
|
||||||
|
# Purpose: Allow aee_dumpstate to read /proc/chip/hw_ver
|
||||||
|
allow dumpstate proc_hw_ver:file { read open };
|
||||||
|
@ -55,6 +55,12 @@ type proc_slogger, fs_type;
|
|||||||
type proc_lk_env, fs_type;
|
type proc_lk_env, fs_type;
|
||||||
type proc_ged, fs_type;
|
type proc_ged, fs_type;
|
||||||
type proc_perfmgr, fs_type;
|
type proc_perfmgr, fs_type;
|
||||||
|
type proc_slabinfo, fs_type;
|
||||||
|
type proc_zraminfo, fs_type;
|
||||||
|
type proc_cpu_alignment, fs_type;
|
||||||
|
type proc_gpulog, fs_type;
|
||||||
|
type proc_sched_debug, fs_type;
|
||||||
|
type proc_hw_ver, fs_type;
|
||||||
type sysfs_therm, fs_type, sysfs_type;
|
type sysfs_therm, fs_type, sysfs_type;
|
||||||
type sysfs_fps, fs_type, sysfs_type;
|
type sysfs_fps, fs_type, sysfs_type;
|
||||||
type sysfs_ccci, fs_type, sysfs_type;
|
type sysfs_ccci, fs_type, sysfs_type;
|
||||||
|
@ -19,6 +19,12 @@ genfscon proc /mrdump_rst u:object_r:proc_mrdump_rst:s0
|
|||||||
genfscon proc /mtk_battery_cmd u:object_r:proc_battery_cmd:s0
|
genfscon proc /mtk_battery_cmd u:object_r:proc_battery_cmd:s0
|
||||||
genfscon proc /ged u:object_r:proc_ged:s0
|
genfscon proc /ged u:object_r:proc_ged:s0
|
||||||
genfscon proc /perfmgr u:object_r:proc_perfmgr:s0
|
genfscon proc /perfmgr u:object_r:proc_perfmgr:s0
|
||||||
|
genfscon proc /slabinfo u:object_r:proc_slabinfo:s0
|
||||||
|
genfscon proc /zraminfo u:object_r:proc_zraminfo:s0
|
||||||
|
genfscon proc /gpulog u:object_r:proc_gpulog:s0
|
||||||
|
genfscon proc /cpu/alignment u:object_r:proc_cpu_alignment:s0
|
||||||
|
genfscon proc /sched_debug u:object_r:proc_sched_debug:s0
|
||||||
|
genfscon proc /chip/hw_ver u:object_r:proc_hw_ver:s0
|
||||||
|
|
||||||
genfscon iso9660 / u:object_r:iso9660:s0
|
genfscon iso9660 / u:object_r:iso9660:s0
|
||||||
genfscon rawfs / u:object_r:rawfs:s0
|
genfscon rawfs / u:object_r:rawfs:s0
|
||||||
|
@ -33,16 +33,16 @@ debug.mdlogger u:object_r:debug_mdlogger_prop:s0
|
|||||||
|
|
||||||
#=============allow AEE==============
|
#=============allow AEE==============
|
||||||
# persist.mtk.aee.mode && persist.mtk.aee.dal
|
# persist.mtk.aee.mode && persist.mtk.aee.dal
|
||||||
persist.mtk.aee u:object_r:persist_mtk_aee_prop:s0
|
persist.vendor.mtk.aee u:object_r:persist_mtk_aee_prop:s0
|
||||||
|
|
||||||
# persist.aee.core.dump && persist.aee.core.direct
|
# persist.aee.core.dump && persist.aee.core.direct
|
||||||
persist.aee u:object_r:persist_aee_prop:s0
|
persist.vendor.aee u:object_r:persist_aee_prop:s0
|
||||||
|
|
||||||
# debug.mtk.aee.db
|
# debug.mtk.aee.db
|
||||||
debug.mtk.aee u:object_r:debug_mtk_aee_prop:s0
|
vendor.debug.mtk.aee u:object_r:debug_mtk_aee_prop:s0
|
||||||
|
|
||||||
#=============allow AEE_Dumpstate==============
|
#=============allow AEE_Dumpstate==============
|
||||||
debug.bq.dump u:object_r:debug_bq_dump_prop:s0
|
vendor.debug.bq.dump u:object_r:debug_bq_dump_prop:s0
|
||||||
|
|
||||||
#=============allow mux==============
|
#=============allow mux==============
|
||||||
vendor.ril.mux. u:object_r:gsm0710muxd_prop:s0
|
vendor.ril.mux. u:object_r:gsm0710muxd_prop:s0
|
||||||
|
@ -134,3 +134,9 @@ allow aee_aed crash_dump:file r_file_perms;
|
|||||||
# for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0
|
# for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0
|
||||||
# tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
|
# tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
|
||||||
#allow aee_aed sysfs:file r_file_perms;
|
#allow aee_aed sysfs:file r_file_perms;
|
||||||
|
|
||||||
|
# Purpose : allow aee_aed to read /proc/version
|
||||||
|
allow aee_aed proc_version:file { read open };
|
||||||
|
|
||||||
|
# Purpose : allow aee_aed self to sys_nice/chown
|
||||||
|
allow aee_aed self:capability { sys_nice chown };
|
||||||
|
Loading…
x
Reference in New Issue
Block a user