Skip to content
Snippets Groups Projects
Commit a49b27af authored by Robert Carr's avatar Robert Carr Committed by Rob Carr
Browse files

SEPolicy for InputFlinger Service.

Add an InputFlinger service in system_server and allow SurfaceFlinger to
exchange sockets with it.

Test: None
Bug: 80101428
Bug: 113136004
Bug: 111440400
Change-Id: I1533ab7a1da0ca61d8a28037fffbc189d796f737
parent 6567cc26
No related branches found
No related tags found
No related merge requests found
...@@ -89,6 +89,7 @@ allow surfaceflinger permission_service:service_manager find; ...@@ -89,6 +89,7 @@ allow surfaceflinger permission_service:service_manager find;
allow surfaceflinger power_service:service_manager find; allow surfaceflinger power_service:service_manager find;
allow surfaceflinger vr_manager_service:service_manager find; allow surfaceflinger vr_manager_service:service_manager find;
allow surfaceflinger window_service:service_manager find; allow surfaceflinger window_service:service_manager find;
allow surfaceflinger inputflinger_service:service_manager find;
# allow self to set SCHED_FIFO # allow self to set SCHED_FIFO
...@@ -98,6 +99,7 @@ r_dir_file(surfaceflinger, cgroup) ...@@ -98,6 +99,7 @@ r_dir_file(surfaceflinger, cgroup)
r_dir_file(surfaceflinger, system_file) r_dir_file(surfaceflinger, system_file)
allow surfaceflinger tmpfs:dir r_dir_perms; allow surfaceflinger tmpfs:dir r_dir_perms;
allow surfaceflinger system_server:fd use; allow surfaceflinger system_server:fd use;
allow surfaceflinger system_server:unix_stream_socket { read write };
allow surfaceflinger ion_device:chr_file r_file_perms; allow surfaceflinger ion_device:chr_file r_file_perms;
# pdx IPC # pdx IPC
......
...@@ -9,7 +9,6 @@ binder_call(inputflinger, system_server) ...@@ -9,7 +9,6 @@ binder_call(inputflinger, system_server)
wakelock_use(inputflinger) wakelock_use(inputflinger)
add_service(inputflinger, inputflinger_service)
allow inputflinger input_device:dir r_dir_perms; allow inputflinger input_device:dir r_dir_perms;
allow inputflinger input_device:chr_file rw_file_perms; allow inputflinger input_device:chr_file rw_file_perms;
......
...@@ -12,7 +12,6 @@ type gatekeeper_service, app_api_service, service_manager_type; ...@@ -12,7 +12,6 @@ type gatekeeper_service, app_api_service, service_manager_type;
type gpu_service, service_manager_type; type gpu_service, service_manager_type;
type idmap_service, service_manager_type; type idmap_service, service_manager_type;
type iorapd_service, service_manager_type; type iorapd_service, service_manager_type;
type inputflinger_service, service_manager_type;
type incident_service, service_manager_type; type incident_service, service_manager_type;
type installd_service, service_manager_type; type installd_service, service_manager_type;
type keystore_service, service_manager_type; type keystore_service, service_manager_type;
...@@ -174,4 +173,5 @@ type wifi_service, app_api_service, system_server_service, service_manager_type; ...@@ -174,4 +173,5 @@ type wifi_service, app_api_service, system_server_service, service_manager_type;
type wificond_service, service_manager_type; type wificond_service, service_manager_type;
type wifiaware_service, app_api_service, system_server_service, service_manager_type; type wifiaware_service, app_api_service, system_server_service, service_manager_type;
type window_service, system_api_service, system_server_service, service_manager_type; type window_service, system_api_service, system_server_service, service_manager_type;
type inputflinger_service, system_api_service, system_server_service, service_manager_type;
type wpantund_service, system_api_service, service_manager_type; type wpantund_service, system_api_service, service_manager_type;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment