diff options
author | Susheel Yadagiri <syadagir@codeaurora.org> | 2014-12-30 12:22:42 -0800 |
---|---|---|
committer | Steve Kondik <steve@cyngn.com> | 2015-01-15 18:07:45 -0800 |
commit | 394243c1fd23262218148084d0fc13d3cab1b1a8 (patch) | |
tree | cae61fa5f1444877ee2e40f216ecb11e9f290883 | |
parent | 2a2c5b719326370fe1d97bdc6b2d59bca60106dc (diff) | |
download | android_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.tar.gz android_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.tar.bz2 android_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.zip |
sepolicy: Added rule to enable unlink of dpmwrapper socket
when dpmd process is restarted dpmwrapper socket needs to be
unlinked and started again. Unlink fails because permission is
denied.
Change-Id: Ie3059785bb7aae940559623e59476d7f15f2730d
-rw-r--r-- | common/dpmd.te | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/common/dpmd.te b/common/dpmd.te index 054a61b4..61e6919c 100644 --- a/common/dpmd.te +++ b/common/dpmd.te @@ -36,3 +36,6 @@ allow dpmd kernel:system module_request; #appdomain allow dpmd appdomain:fd use; allow dpmd appdomain:tcp_socket { read write getopt getattr }; + +#permission to unlink dpmwrapper socket +allow dpmd socket_device:dir remove_name; |