This change moves all gxp sepolicies to common. This eliminates the need for having these policies in sepolicy folder of all P22+ devices. Tested: Created private builds and found no selinux violations for P22 & P23 devices. Bug: 288368306 Change-Id: Iec5dfe01dd9088a117f549cc999b9ee2aa2c4484 Signed-off-by: Dinesh Yadav <dkyadav@google.com>
22 lines
744 B
Plaintext
22 lines
744 B
Plaintext
type gxp_logging, domain;
|
|
type gxp_logging_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(gxp_logging)
|
|
|
|
# The logging service accesses /dev/gxp
|
|
allow gxp_logging gxp_device:chr_file rw_file_perms;
|
|
|
|
# Allow logging service to access /sys/class/gxp
|
|
allow gxp_logging sysfs_gxp:dir search;
|
|
allow gxp_logging sysfs_gxp:file rw_file_perms;
|
|
|
|
# Allow logging service to log to stats service for reporting metrics.
|
|
allow gxp_logging fwk_stats_service:service_manager find;
|
|
binder_call(gxp_logging, system_server);
|
|
binder_use(gxp_logging)
|
|
|
|
# Allow logging service to read gxp properties.
|
|
get_prop(gxp_logging, vendor_gxp_prop)
|
|
|
|
# Allow gxp tracing service to send packets to Perfetto
|
|
userdebug_or_eng(`perfetto_producer(gxp_logging)')
|