diff options
author | Nick Kralevich <nnk@google.com> | 2014-05-23 13:33:32 -0700 |
---|---|---|
committer | Nick Kralevich <nnk@google.com> | 2014-05-23 15:44:40 -0700 |
commit | 8599e34b95705638034b798c56bc2cc8bb2e6372 (patch) | |
tree | d429bb7c5fecb4bdc5b15108edb1faabc418a84b /rild.te | |
parent | ccb9f7a1000c35721a28c501c52b0ae87dfcb775 (diff) | |
download | android_external_sepolicy-8599e34b95705638034b798c56bc2cc8bb2e6372.tar.gz android_external_sepolicy-8599e34b95705638034b798c56bc2cc8bb2e6372.tar.bz2 android_external_sepolicy-8599e34b95705638034b798c56bc2cc8bb2e6372.zip |
Introduce wakelock_use()
Introduce wakelock_use(). This macro declares that a domain uses
wakelocks.
Wakelocks require both read-write access to files in /sys/power, and
CAP_BLOCK_SUSPEND. This macro helps ensure that both capabilities and
file access are granted at the same time.
Still TODO: fix device specific wakelock use.
Change-Id: Ib98ff374a73f89e403acd9f5e024988f59f08115
Diffstat (limited to 'rild.te')
-rw-r--r-- | rild.te | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -39,6 +39,6 @@ allow rild self:netlink_socket create_socket_perms; allow rild self:netlink_kobject_uevent_socket create_socket_perms; # Access to wake locks -allow rild sysfs_wake_lock:file rw_file_perms; +wakelock_use(rild) allow rild self:socket create_socket_perms; |