diff options
Diffstat (limited to 'r_non_plat/mtk_hal_power.te')
-rw-r--r-- | r_non_plat/mtk_hal_power.te | 161 |
1 files changed, 0 insertions, 161 deletions
diff --git a/r_non_plat/mtk_hal_power.te b/r_non_plat/mtk_hal_power.te deleted file mode 100644 index fa52542..0000000 --- a/r_non_plat/mtk_hal_power.te +++ /dev/null @@ -1,161 +0,0 @@ -# ============================================================================== -# Type Declaration -# ============================================================================== -type mtk_hal_power, domain; -type mtk_hal_power_exec, exec_type, file_type, vendor_file_type; - -# hwbinder access -init_daemon_domain(mtk_hal_power) -hwbinder_use(mtk_hal_power); - -get_prop(mtk_hal_power, hwservicemanager_prop) -allow mtk_hal_power hal_power_hwservice:hwservice_manager { add find }; -allow mtk_hal_power hidl_base_hwservice:hwservice_manager add; - -add_hwservice(mtk_hal_power, mtk_hal_power_hwservice) -allow hal_power_client mtk_hal_power_hwservice:hwservice_manager find; - -hal_server_domain(mtk_hal_power, hal_power); -hal_server_domain(mtk_hal_power, hal_wifi); - -# sysfs -allow mtk_hal_power sysfs_devices_system_cpu:file rw_file_perms; - -# debugfs -allow mtk_hal_power debugfs_ged:dir r_dir_perms; -allow mtk_hal_power debugfs_ged:file rw_file_perms; - -# proc_thermal -allow mtk_hal_power proc_thermal:file w_file_perms; - -# proc info -allow mtk_hal_power mtk_hal_audio:dir r_dir_perms; - -# Date : 2017/10/02 -# Operation: SQC -# Purpose : Allow powerHAL to access perfmgr -allow mtk_hal_power proc_perfmgr:dir r_dir_perms; -allow mtk_hal_power proc_perfmgr:file rw_file_perms; -allowxperm mtk_hal_power proc_perfmgr:file ioctl PERFMGR_FPSGO_TOUCH; - -# Date : 2017/10/11 -# Operation: SQC -# Purpose : Allow powerHAL to access powerhal folder -allow mtk_hal_power sdcard_type:dir create_dir_perms; -allow mtk_hal_power sdcard_type:file create_file_perms; -allow mtk_hal_power eemcs_device:chr_file rw_file_perms; -allow mtk_hal_power mnt_user_file:dir create_dir_perms; - -allow mtk_hal_power mtk_powerhal_data_file:dir {create_dir_perms rw_dir_perms}; -allow mtk_hal_power mtk_powerhal_data_file:file {create_file_perms rw_file_perms}; -allow mtk_hal_power mtk_powerhal_data_file:sock_file {create_file_perms rw_file_perms}; - -#camera contorl cpu -allow mtk_hal_power mtk_hal_camera:dir r_dir_perms; -allow mtk_hal_power mtk_hal_camera:file r_file_perms; - -# Date : 2017/10/24 -# Operation: SQC -# Purpose : Allow powerHAL to access thermal -allow mtk_hal_power proc_thermal:dir r_dir_perms; -allow mtk_hal_power debugfs_fpsgo:dir r_dir_perms; -allow mtk_hal_power debugfs_fpsgo:file rw_file_perms; - -# Date : 2017/12/19 -# Operation: SQC -# Purpose : Allow powerHAL to access wlan -allow mtk_hal_power proc_net:file w_file_perms; - -# Date : 2017/12/21 -# Operation: SQC -# Purpose : Allow powerHAL to access mediacodec -allow mtk_hal_power mediacodec:dir r_dir_perms; -allow mtk_hal_power mediacodec:file r_file_perms; - -set_prop(mtk_hal_power, mtk_thermal_config_prop) - -# Date : 2018/03/16 -# Operation: SQC -# Purpose : Allow powerHAL to access /d/mtkfb -allow mtk_hal_power debugfs_fb:dir r_dir_perms; -allow mtk_hal_power debugfs_fb:file rw_file_perms; - -# Date : 2018/06/26 -# Operation: Thermal change policy in perfservice - -allow mtk_hal_power proc_thermal:file r_file_perms; -allow mtk_hal_power thermal_manager_data_file:file create_file_perms; -allow mtk_hal_power thermal_manager_data_file:dir { rw_dir_perms setattr }; - - -allow mtk_hal_power thermalloadalgod:unix_stream_socket connectto; - -allow mtk_hal_power proc_mtkcooler:dir r_dir_perms; -allow mtk_hal_power proc_mtkcooler:file rw_file_perms; -allow mtk_hal_power proc_mtktz:dir r_dir_perms; -allow mtk_hal_power proc_mtktz:file rw_file_perms; - -# Date : 2019/05/08 -# Operation: SQC -# Purpose : Allow powerHAL to access /proc/[pid] -allow mtk_hal_power system_server:dir r_dir_perms; -allow mtk_hal_power system_server:file r_file_perms; - -# Date : 2019/07/11 -# Operation: mt6779 SQC -# Purpose : Allow powerHAL to VPU, RILD -allow mtk_hal_power debugfs_vpu_power:dir r_dir_perms; -allow mtk_hal_power debugfs_vpu_power:file rw_file_perms; - -allow mtk_hal_power debugfs_mdla_power:dir r_dir_perms; -allow mtk_hal_power debugfs_mdla_power:file rw_file_perms; - -allow mtk_hal_power rild_oem_socket:sock_file write; -allow mtk_hal_power rild:unix_stream_socket connectto; - -# Date : 2019/05/22 -# Operation: SQC -# Purpose : Allow powerHAL to access block read ahead -allow mtk_hal_power sysfs_dm:dir r_dir_perms; -allow mtk_hal_power sysfs_dm:file rw_file_perms; -allow mtk_hal_power sysfs_mmcblk:dir r_dir_perms; -allow mtk_hal_power sysfs_mmcblk:file rw_file_perms; - -allow mtk_hal_power debugfs_eara_thermal:dir search; -allow mtk_hal_power debugfs_eara_thermal:file { getattr open write read }; - -# Date : 2019/05/22 -# Operation: SQC -# Purpose : Allow powerHAL to access prop -set_prop(mtk_hal_power, mtk_powerhal_prop) - -# Date : 2019/05/29 -# Operation: SQC -# Purpose : Allow powerHAL to access wifi driver -allow mtk_hal_power self:udp_socket create; -allow mtk_hal_power kernel:system module_request; -allow mtk_hal_power self:capability sys_module; -allowxperm mtk_hal_power self:udp_socket ioctl priv_sock_ioctls; - -# Date : W19.20 -# Operation : MTK power hal migration -# Purpose : MTK power hal interface permission -set_prop(mtk_hal_power, mtk_powerhal_prop) - -# Date : 2019/09/05 -# Operation: SQC -# Purpose : Add procfs, sysfs policy -allow mtk_hal_power proc_ppm:dir r_dir_perms; -allow mtk_hal_power proc_ppm:file rw_file_perms; -allow mtk_hal_power proc_cpufreq:dir r_dir_perms; -allow mtk_hal_power proc_cpufreq:file rw_file_perms; -allow mtk_hal_power proc_hps:dir r_dir_perms; -allow mtk_hal_power proc_hps:file rw_file_perms; -allow mtk_hal_power proc_cm_mgr:dir r_dir_perms; -allow mtk_hal_power proc_cm_mgr:file rw_file_perms; -allow mtk_hal_power sysfs_ged:dir r_dir_perms; -allow mtk_hal_power sysfs_ged:file rw_file_perms; -allow mtk_hal_power sysfs_fbt_cpu:dir r_dir_perms; -allow mtk_hal_power sysfs_fbt_cpu:file rw_file_perms; -allow mtk_hal_power sysfs_fbt_fteh:dir r_dir_perms; -allow mtk_hal_power sysfs_fbt_fteh:file rw_file_perms; |