summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormyfluxi <linflux@arcor.de>2014-12-31 00:36:13 +0100
committermyfluxi <linflux@arcor.de>2014-12-31 00:59:15 +0100
commit233406f509e344c11d9a39a647cd6381afa42304 (patch)
treeb4a21a1c94e3cdf279d5bf5040f29b93dd4b84d8
parentdbda30f1dd8e7b7d0cf238bb35845a4013a6a448 (diff)
downloadandroid_device_qcom_sepolicy-233406f509e344c11d9a39a647cd6381afa42304.tar.gz
android_device_qcom_sepolicy-233406f509e344c11d9a39a647cd6381afa42304.tar.bz2
android_device_qcom_sepolicy-233406f509e344c11d9a39a647cd6381afa42304.zip
sepolicy: Allow untrusted apps to read temp sensors
Change-Id: I8636f704d7f917e69b69710337ac3dd0e14bda54
-rw-r--r--common/untrusted_app.te5
1 files changed, 5 insertions, 0 deletions
diff --git a/common/untrusted_app.te b/common/untrusted_app.te
index 07910098..8a50a578 100644
--- a/common/untrusted_app.te
+++ b/common/untrusted_app.te
@@ -5,6 +5,11 @@ unix_socket_connect(untrusted_app, mpctl, perfd)
unix_socket_send(untrusted_app, mpctl, mpdecision)
unix_socket_connect(untrusted_app, mpctl, mpdecision)
+# read temp sensors
+allow untrusted_app sysfs_thermal:file r_file_perms;
+allow untrusted_app sysfs_thermal:lnk_file r_file_perms;
+allow untrusted_app sysfs_thermal:dir r_dir_perms;
+
# test apps needs to communicate with imscm
# using binder call
userdebug_or_eng(`