############################################################ # Rules for appmanserver. ############################################################ # /dev/dfb.0/surface #allow appman_server dfb_surface_device:dir {create write add_name remove_name} ; #allow appman_server dfb_surface_device:file {create open read write setattr unlink} ; allow appman_server dfb_surface_device:dir create_dir_perms ; allow appman_server dfb_surface_device:file create_file_perms ; #/dev/ir #allow appman_server ir_device:chr_file { open read write ioctl}; allow appman_server ir_device:chr_file rw_file_perms; #/dev/mmz_userdev #allow appman_server mmz_userdev_device:chr_file {open ioctl read write}; allow appman_server mmz_userdev_device:chr_file rw_file_perms; #/dev/soc_module #allow appman_server module_device:chr_file { open read write ioctl}; allow appman_server module_device:chr_file rw_file_perms; #/dev/soc_stat #allow appman_server stat_device:chr_file { open read write ioctl}; allow appman_server stat_device:chr_file rw_file_perms; #/dev/soc_sys #allow appman_server sys_device:chr_file { open read write }; allow appman_server sys_device:chr_file rw_file_perms; #/dev/soc_userproc #allow appman_server userproc_device:chr_file { open read write ioctl }; allow appman_server userproc_device:chr_file rw_file_perms; #/dev/tde #allow appman_server tde_device:chr_file { open read write ioctl}; allow appman_server tde_device:chr_file rw_file_perms; ######################################## # dfb device ######################################## type_transition appman_server device:dir dfb_surface_device "dfb.0"; type_transition appman_server device:file dfb_fusion_device "fusion.0"; type_transition appman_server device:file dfb_fusion_device "fusion.0.1"; type_transition appman_server device:file dfb_fusion_device "fusion.0.2"; type_transition appman_server device:file dfb_fusion_device "fusion.0.3"; type_transition appman_server device:file dfb_fusion_device "fusion.0.4";