diff options
| -rw-r--r-- | sepolicy/vendor/hal_power_default.te | 2 | ||||
| -rw-r--r-- | sepolicy/vendor/priv_app.te | 1 | ||||
| -rw-r--r-- | sepolicy/vendor/system_app.te | 1 |
3 files changed, 4 insertions, 0 deletions
diff --git a/sepolicy/vendor/hal_power_default.te b/sepolicy/vendor/hal_power_default.te index 7fc2055..10f864c 100644 --- a/sepolicy/vendor/hal_power_default.te +++ b/sepolicy/vendor/hal_power_default.te @@ -3,3 +3,5 @@ allow hal_power_default sysfs_sensors:file { open write }; allow hal_power_default debugfs:file getattr; allow hal_power_default qti_debugfs:file { getattr open read }; allow hal_power_default sysfs_gesture:file rw_file_perms; +allow hal_power_default sysfs_msm_subsys:dir r_dir_perms; +allow hal_power_default sysfs_msm_subsys:file rw_file_perms; diff --git a/sepolicy/vendor/priv_app.te b/sepolicy/vendor/priv_app.te index 50d0fb2..818b850 100644 --- a/sepolicy/vendor/priv_app.te +++ b/sepolicy/vendor/priv_app.te @@ -12,6 +12,7 @@ allow priv_app hal_memtrack_default:binder call; allow priv_app nonplat_service_contexts_file:file r_file_perms; allow priv_app crashdata_data_file:dir r_dir_perms; allow priv_app mnt_vendor_file:lnk_file r_file_perms; +allow priv_app mnt_vendor_file:dir search; allow priv_app init_exec:lnk_file r_file_perms; allow priv_app cgroup:dir r_dir_perms; allow priv_app mnt_media_rw_file:dir r_dir_perms; diff --git a/sepolicy/vendor/system_app.te b/sepolicy/vendor/system_app.te index fdc31d3..aa6128c 100644 --- a/sepolicy/vendor/system_app.te +++ b/sepolicy/vendor/system_app.te @@ -11,3 +11,4 @@ allow system_app sysfs_gesture:file rw_file_perms; allow system_app rootfs:dir r_dir_perms; allow system_app sysfs_msm_subsys:dir r_dir_perms; allow system_app sysfs_msm_subsys:file r_file_perms; +allow system_app sysfs:file write; |
