Merge "Add msm_irqbalance te file and policies"

This commit is contained in:
Linux Build Service Account
2018-03-14 17:11:24 -07:00
committed by Gerrit - the friendly Code Review server
5 changed files with 19 additions and 0 deletions

View File

@@ -10,6 +10,7 @@ type sysfs_fingerprint, sysfs_type, fs_type;
type sysfs_graphics, sysfs_type, fs_type;
type sysfs_kgsl, sysfs_type, fs_type;
type hbtp_kernel_sysfs, file_type, sysfs_type;
type sysfs_irqbalance, file_type, sysfs_type;
type sysfs_laser, sysfs_type, fs_type;
type sysfs_mdss_mdp_caps, sysfs_type, fs_type;
type sysfs_mmc_host, fs_type, sysfs_type;

View File

@@ -112,6 +112,7 @@
/vendor/bin/cnd u:object_r:cnd_exec:s0
/vendor/bin/oemlock_provision u:object_r:hal_bootctl_default_exec:s0
/vendor/bin/oemlock-bridge u:object_r:hal_bootctl_default_exec:s0
/(vendor|system/vendor)/bin/msm_irqbalance u:object_r:msm_irqbalanced_exec:s0
/vendor/bin/hw/android\.hardware\.usb@1\.1-service.crosshatch u:object_r:hal_usb_default_exec:s0
/vendor/bin/hw/android\.hardware\.power@1\.1-service.crosshatch u:object_r:hal_power_default_exec:s0
/vendor/bin/chre u:object_r:chre_exec:s0

View File

@@ -6,6 +6,7 @@ genfscon sysfs /android_touch u:object_r:sysfs_touch:s0
genfscon sysfs /devices/virtual/input/ftm4_touch u:object_r:sysfs_touch:s0
genfscon sysfs /class/rfkill/rfkill0/state u:object_r:sysfs_bluetooth_writable:s0
genfscon sysfs /kernel/irq_helper/irq_blacklist_on u:object_r:sysfs_irqbalance:s0
genfscon sysfs /class/uio u:object_r:sysfs_uio:s0
genfscon sysfs /devices/soc/soc:bt_wcn3990 u:object_r:sysfs_bluetooth_writable:s0

View File

@@ -129,3 +129,5 @@ allow qti_init_shell sysfs_usb_supply:file setattr;
allow qti_init_shell sysfs_devices_system_cpu:file w_file_perms;
allow qti_init_shell sysfs_msm_power:file rw_file_perms;
allow qti_init_shell msm_irqbalanced_exec:file getattr;

14
vendor/common/msm_irqbalanced.te vendored Normal file
View File

@@ -0,0 +1,14 @@
type msm_irqbalanced, domain;
type msm_irqbalanced_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(msm_irqbalanced)
allow msm_irqbalanced cgroup:dir { create add_name };
allow msm_irqbalanced { proc sysfs_devices_system_cpu }:file w_file_perms;
# access smp_affinity
allow msm_irqbalanced proc:file r_file_perms;
allow msm_irqbalanced proc_interrupts:file r_file_perms;
allow msm_irqbalanced proc_stat:file r_file_perms;
# irq_blacklist_on
allow msm_irqbalanced sysfs_irqbalance:file r_file_perms;