summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSusheel Yadagiri <syadagir@codeaurora.org>2014-12-30 12:22:42 -0800
committerSteve Kondik <steve@cyngn.com>2015-01-15 18:07:45 -0800
commit394243c1fd23262218148084d0fc13d3cab1b1a8 (patch)
treecae61fa5f1444877ee2e40f216ecb11e9f290883
parent2a2c5b719326370fe1d97bdc6b2d59bca60106dc (diff)
downloadandroid_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.tar.gz
android_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.tar.bz2
android_device_qcom_sepolicy-394243c1fd23262218148084d0fc13d3cab1b1a8.zip
sepolicy: Added rule to enable unlink of dpmwrapper socket
when dpmd process is restarted dpmwrapper socket needs to be unlinked and started again. Unlink fails because permission is denied. Change-Id: Ie3059785bb7aae940559623e59476d7f15f2730d
-rw-r--r--common/dpmd.te3
1 files changed, 3 insertions, 0 deletions
diff --git a/common/dpmd.te b/common/dpmd.te
index 054a61b4..61e6919c 100644
--- a/common/dpmd.te
+++ b/common/dpmd.te
@@ -36,3 +36,6 @@ allow dpmd kernel:system module_request;
#appdomain
allow dpmd appdomain:fd use;
allow dpmd appdomain:tcp_socket { read write getopt getattr };
+
+#permission to unlink dpmwrapper socket
+allow dpmd socket_device:dir remove_name;