diff options
author | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2022-04-08 03:07:16 +0000 |
---|---|---|
committer | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2022-04-08 03:07:16 +0000 |
commit | 38d1c7911f719e24d75e8b1012adeff2b81efb9b (patch) | |
tree | 3a97fd86bd047d8b4225e3189522ac365818e7ab | |
parent | d68076d79f47e6409477caccc0437d4728e72c4e (diff) | |
parent | 39b3d9c8a9b28a653be0b33409542a4f38251b0f (diff) | |
download | pixel-sepolicy-38d1c7911f719e24d75e8b1012adeff2b81efb9b.tar.gz |
Snap for 8421339 from 39b3d9c8a9b28a653be0b33409542a4f38251b0f to tm-d3-release
Change-Id: I3e297d86abe48b872caa547ad364546f98eaec4d
-rw-r--r-- | common/vendor/file.te | 3 | ||||
-rw-r--r-- | powerstats/hal_power_stats_default.te | 2 | ||||
-rw-r--r-- | thermal/hal_thermal_default.te | 1 |
3 files changed, 0 insertions, 6 deletions
diff --git a/common/vendor/file.te b/common/vendor/file.te index 731c205..8fb41bc 100644 --- a/common/vendor/file.te +++ b/common/vendor/file.te @@ -1,5 +1,2 @@ type persist_file, file_type, vendor_persist_type; type sysfs_iio_devices, fs_type, sysfs_type; - -# ODPM -type sysfs_odpm, sysfs_type, fs_type;
\ No newline at end of file diff --git a/powerstats/hal_power_stats_default.te b/powerstats/hal_power_stats_default.te index a3ee625..b125ef7 100644 --- a/powerstats/hal_power_stats_default.te +++ b/powerstats/hal_power_stats_default.te @@ -6,5 +6,3 @@ add_service(hal_power_stats_server, hal_power_stats_service) r_dir_file(hal_power_stats_default, sysfs_power_stats) allow hal_power_stats_default power_stats_device:chr_file rw_file_perms; -allow hal_power_stats_default sysfs_odpm:dir search; -allow hal_power_stats_default sysfs_odpm:file rw_file_perms;
\ No newline at end of file diff --git a/thermal/hal_thermal_default.te b/thermal/hal_thermal_default.te index 1510b74..2498b20 100644 --- a/thermal/hal_thermal_default.te +++ b/thermal/hal_thermal_default.te @@ -5,7 +5,6 @@ allow hal_thermal_default thermal_link_device:dir r_dir_perms; allow hal_thermal_default proc_stat:file r_file_perms; allow hal_thermal_default self:netlink_generic_socket create_socket_perms_no_ioctl; allow hal_thermal_default self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; -allow hal_thermal_default sysfs_odpm:file r_file_perms; hal_client_domain(hal_thermal_default, hal_power); |