Seandroid: Added rules to thermal-engine

Added rules to thermal-engine for access to thermal-sockets which
is needed for  mediaserver ,camera and couple of other services.

Change-Id: I7f5f89c112357ee595f275b20325fede40439924
This commit is contained in:
Kurva Harish
2014-11-19 17:06:16 -08:00
committed by Ricardo Cerqueira
parent 7dbb59b937
commit d03bdc134d
3 changed files with 12 additions and 6 deletions

View File

@@ -30,3 +30,6 @@ unix_socket_connect(mediaserver, thermal, thermal-engine)
allow mediaserver mpctl_socket:dir r_dir_perms;
unix_socket_send(mediaserver, mpctl, perfd)
unix_socket_connect(mediaserver, mpctl, perfd)
# for thermal sock files
unix_socket_connect(mediaserver, thermal, thermal-engine)

View File

@@ -38,3 +38,6 @@ allow system_server location_data_file:sock_file rw_file_perms;
#For wifistatemachine
allow system_server kernel:key search;
allow system_server wbc_service:service_manager add;
allow system_server fuse:dir search;
allow system_server persist_file:dir search;

View File

@@ -7,17 +7,17 @@ init_daemon_domain(thermal-engine)
#============= thermal-engine ==============
#This is to access thermal query device
allow thermal-engine thermal_device:chr_file { read write ioctl open };
allow thermal-engine thermal_device:chr_file rw_file_perms;
#This is required to access smem log device
allow thermal-engine smem_log_device:chr_file { read write ioctl open };
allow thermal-engine smem_log_device:chr_file rw_file_perms;
allow thermal-engine self:capability { dac_read_search dac_override fsetid };
allow thermal-engine self:socket { create ioctl read write };
allow thermal-engine self:socket create_socket_perms;
#This is required to access thermal sockets
allow thermal-engine thermal_socket:dir { write add_name };
allow thermal-engine thermal_socket:dir w_dir_perms;
allow thermal-engine thermal_socket:sock_file { create setattr open read write };
#This is required for thermal sysfs access
allow thermal-engine sysfs_thermal:dir { read search open };
allow thermal-engine sysfs_thermal:file { read write getattr open };
allow thermal-engine sysfs_thermal:dir r_dir_perms;
allow thermal-engine sysfs_thermal:file rw_file_perms;
allow thermal-engine sysfs_thermal:lnk_file read;
#This is required for qmi access
qmux_socket(thermal-engine);