Files
android_device_qcom_sepolicy/common/thermal-engine.te
Ricardo Cerqueira c76fa3504d Merge remote-tracking branch 'caf/LA.BF.2.1_rb1.6' into cm-12.0
Conflicts:
	Android.mk
	common/file_contexts
	common/ims.te
	common/mm-pp-daemon.te
	common/netmgrd.te
	common/radio.te
	common/service.te
	common/service_contexts
	common/system_app.te
	common/system_server.te
	common/thermal-engine.te
	common/untrusted_app.te
	common/wpa.te
	msm8960/Android.mk
	msm8960/file.te
	msm8960/file_contexts

Change-Id: I8308142c06d36380d422fd2256cceae2227fd04f
2014-12-29 16:25:58 +00:00

32 lines
1.3 KiB
Plaintext

# thermal-engine daemon
type thermal-engine, domain;
type thermal-engine_exec, exec_type, file_type;
# Started by init
init_daemon_domain(thermal-engine)
#============= thermal-engine ==============
#This is to access thermal query device
allow thermal-engine thermal_device:chr_file rw_file_perms;
#This is required to access smem log device
allow thermal-engine smem_log_device:chr_file rw_file_perms;
allow thermal-engine self:capability { dac_read_search dac_override fsetid chown };
allow thermal-engine self:socket create_socket_perms;
#This is required to access thermal sockets
allow thermal-engine thermal_socket:dir w_dir_perms;
allow thermal-engine thermal_socket:sock_file { create setattr open read write unlink };
#This is required for thermal sysfs access
allow thermal-engine sysfs_thermal:dir r_dir_perms;
allow thermal-engine sysfs_thermal:file rw_file_perms;
allow thermal-engine sysfs_thermal:lnk_file read;
allow thermal-engine sysfs:file write;
#This is required for qmi access
qmux_socket(thermal-engine);
allow thermal-engine sysfs_mpdecision:file rw_file_perms;
r_dir_file(thermal-engine, sysfs_ssr);
#Label the thermal sockets correctly
type_transition thermal-engine socket_device:sock_file thermal_socket;
#Allow creation of the sockets in the socket dir
allow thermal-engine socket_device:dir { write add_name remove_name };