Seandroid: Added rules to thermal-engine
Added rules to thermal-engine for access to thermal-sockets which is needed for mediaserver ,camera and couple of other services. Change-Id: I7f5f89c112357ee595f275b20325fede40439924
This commit is contained in:
		
				
					committed by
					
						
						Ricardo Cerqueira
					
				
			
			
				
	
			
			
			
						parent
						
							7dbb59b937
						
					
				
				
					commit
					d03bdc134d
				
			@@ -30,3 +30,6 @@ unix_socket_connect(mediaserver, thermal, thermal-engine)
 | 
			
		||||
allow mediaserver mpctl_socket:dir r_dir_perms;
 | 
			
		||||
unix_socket_send(mediaserver, mpctl, perfd)
 | 
			
		||||
unix_socket_connect(mediaserver, mpctl, perfd)
 | 
			
		||||
 | 
			
		||||
# for thermal sock files
 | 
			
		||||
unix_socket_connect(mediaserver, thermal, thermal-engine)
 | 
			
		||||
 
 | 
			
		||||
@@ -38,3 +38,6 @@ allow system_server location_data_file:sock_file rw_file_perms;
 | 
			
		||||
#For wifistatemachine
 | 
			
		||||
allow system_server kernel:key search;
 | 
			
		||||
allow system_server wbc_service:service_manager add;
 | 
			
		||||
 | 
			
		||||
allow system_server fuse:dir search;
 | 
			
		||||
allow system_server persist_file:dir search;
 | 
			
		||||
 
 | 
			
		||||
@@ -7,17 +7,17 @@ init_daemon_domain(thermal-engine)
 | 
			
		||||
 | 
			
		||||
#============= thermal-engine ==============
 | 
			
		||||
#This is to access thermal query device
 | 
			
		||||
allow thermal-engine thermal_device:chr_file { read write ioctl open };
 | 
			
		||||
allow thermal-engine thermal_device:chr_file rw_file_perms;
 | 
			
		||||
#This is required to access smem log device
 | 
			
		||||
allow thermal-engine smem_log_device:chr_file { read write ioctl open };
 | 
			
		||||
allow thermal-engine smem_log_device:chr_file rw_file_perms;
 | 
			
		||||
allow thermal-engine self:capability { dac_read_search dac_override fsetid };
 | 
			
		||||
allow thermal-engine self:socket { create ioctl read write };
 | 
			
		||||
allow thermal-engine self:socket create_socket_perms;
 | 
			
		||||
#This is required to access thermal sockets
 | 
			
		||||
allow thermal-engine thermal_socket:dir { write add_name };
 | 
			
		||||
allow thermal-engine thermal_socket:dir w_dir_perms;
 | 
			
		||||
allow thermal-engine thermal_socket:sock_file { create setattr open read write };
 | 
			
		||||
#This is required for thermal sysfs access
 | 
			
		||||
allow thermal-engine sysfs_thermal:dir { read search open };
 | 
			
		||||
allow thermal-engine sysfs_thermal:file { read write getattr open };
 | 
			
		||||
allow thermal-engine sysfs_thermal:dir r_dir_perms;
 | 
			
		||||
allow thermal-engine sysfs_thermal:file rw_file_perms;
 | 
			
		||||
allow thermal-engine sysfs_thermal:lnk_file read;
 | 
			
		||||
#This is required for qmi access
 | 
			
		||||
qmux_socket(thermal-engine);
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user