sm6375-common: sepolicy: Address some denials for fogos
Change-Id: I3ab1949c10eb3313a3fb701bbddeffb4bf15237c
This commit is contained in:
parent
8d0f27975b
commit
3092927bb5
3 changed files with 6 additions and 2 deletions
2
sepolicy/vendor/genfs_contexts
vendored
2
sepolicy/vendor/genfs_contexts
vendored
|
@ -65,6 +65,7 @@ genfscon sysfs /devices/platform/soc/4e00000.ssusb/mode
|
|||
|
||||
# Vibrator
|
||||
genfscon sysfs /devices/platform/soc/984000.i2c/i2c-0/0-005a/leds/vibrator u:object_r:sysfs_vibrator:s0
|
||||
genfscon sysfs /sys/devices/platform/soc/soc:ldo_vib/leds/vibrator(/.*)? u:object_r:vendor_sysfs_vibrator:s0
|
||||
|
||||
# Wakeup
|
||||
genfscon sysfs /devices/platform/soc/984000.i2c/i2c-0/0-005a/wakeup/wakeup u:object_r:sysfs_wakeup:s0
|
||||
|
@ -82,3 +83,4 @@ genfscon sysfs /devices/platform/soc/1c40000.qcom,spmi/spmi-0/spmi0-02/1c40000.q
|
|||
genfscon sysfs /devices/platform/soc/1c40000.qcom,spmi/spmi-0/spmi0-02/1c40000.qcom,spmi:qcom,pm7250b@2:qcom,qpnp-smb5/power_supply/usb/wakeup u:object_r:sysfs_wakeup:s0
|
||||
genfscon sysfs /devices/platform/soc/4c90000.i2c/i2c-2/2-006a/power_supply/bq25960-standalone/wakeup u:object_r:sysfs_wakeup:s0
|
||||
genfscon sysfs /devices/platform/soc/soc:mmi_chrg_manager/power_supply/mmi_chrg_manager/wakeup u:object_r:sysfs_wakeup:s0
|
||||
genfscon sysfs /devices/platform/soc/soc:qcom,msm-audio-apr/soc:qcom,msm-audio-apr:qcom,q6core-audio/soc:qcom,msm-audio-apr:qcom,q6core-audio:sound/Listen u:object_r:sysfs_wakeup:s0
|
||||
|
|
2
sepolicy/vendor/init.te
vendored
2
sepolicy/vendor/init.te
vendored
|
@ -23,3 +23,5 @@ recovery_only(`
|
|||
')
|
||||
|
||||
allow init vendor_sysfs_vibrator:file create_file_perms;
|
||||
|
||||
allow init vendor_sysfs_scsi_host:file w_file_perms;
|
||||
|
|
2
sepolicy/vendor/vendor_qti_init_shell.te
vendored
2
sepolicy/vendor/vendor_qti_init_shell.te
vendored
|
@ -3,5 +3,5 @@ allow vendor_qti_init_shell configfs:file create_file_perms;
|
|||
allow vendor_qti_init_shell configfs:lnk_file create_file_perms;
|
||||
allow vendor_qti_init_shell kmsg_device:chr_file w_file_perms;
|
||||
allow vendor_qti_init_shell proc_page_cluster:file w_file_perms;
|
||||
|
||||
allow vendor_qti_init_shell sysfs:file { w_file_perms setattr };
|
||||
allow vendor_qti_init_shell vendor_file:file execute_no_trans;
|
Loading…
Reference in a new issue