summaryrefslogtreecommitdiffstats
path: root/sepolicy
diff options
context:
space:
mode:
authorWolfgang Wiedmeyer <wolfgit@wiedmeyer.de>2016-03-18 10:59:16 +0100
committerWolfgang Wiedmeyer <wolfgit@wiedmeyer.de>2016-03-18 10:59:16 +0100
commitbe9e1314a1cc2e46d59707ea94c6ec8da8546689 (patch)
tree78ab82a2146c303c0e5d2209cca2c3919fa5c685 /sepolicy
parent9c205f060300a98bd58bda75ef0a8ea807153335 (diff)
parentb7c8dec762fa745dd1c06d2a8a007cfec31128b2 (diff)
downloadvendor_replicant-be9e1314a1cc2e46d59707ea94c6ec8da8546689.zip
vendor_replicant-be9e1314a1cc2e46d59707ea94c6ec8da8546689.tar.gz
vendor_replicant-be9e1314a1cc2e46d59707ea94c6ec8da8546689.tar.bz2
Merge branch 'cm-13.0' of https://github.com/CyanogenMod/android_vendor_cm into replicant-6.0
Diffstat (limited to 'sepolicy')
-rw-r--r--sepolicy/platform_app.te3
-rw-r--r--sepolicy/recovery.te3
-rw-r--r--sepolicy/service.te2
-rw-r--r--sepolicy/service_contexts2
-rw-r--r--sepolicy/su.te2
5 files changed, 12 insertions, 0 deletions
diff --git a/sepolicy/platform_app.te b/sepolicy/platform_app.te
index db8647d..bbd4dd4 100644
--- a/sepolicy/platform_app.te
+++ b/sepolicy/platform_app.te
@@ -2,3 +2,6 @@
# This is a performance optimization that allows platform apps to bypass the FUSE layer
allow platform_app sdcard_posix:dir create_dir_perms;
allow platform_app sdcard_posix:file create_file_perms;
+
+# Allow Gallery3D to crop user images
+allow platform_app system_app_data_file:file rw_file_perms;
diff --git a/sepolicy/recovery.te b/sepolicy/recovery.te
index 76e7a62..da6ddac 100644
--- a/sepolicy/recovery.te
+++ b/sepolicy/recovery.te
@@ -29,6 +29,9 @@ allow recovery sdcard_posix:file r_file_perms;
# Control properties
allow recovery recovery_prop:property_service set;
+# Set property sys.usb.ffs.ready
+allow recovery ffs_prop:property_service set;
+
# recursive rm for wipes... :(
allow app_data_file self:filesystem associate;
allow recovery app_data_file:file { read open create write };
diff --git a/sepolicy/service.te b/sepolicy/service.te
index 579e2b8..1a6559f 100644
--- a/sepolicy/service.te
+++ b/sepolicy/service.te
@@ -9,3 +9,5 @@ type cm_telephony_service, system_api_service, system_server_service, service_ma
type cm_hardware_service, system_api_service, system_server_service, service_manager_type;
type cm_app_suggest_service, system_api_service, system_server_service, service_manager_type;
type cm_performance_service, system_api_service, system_server_service, service_manager_type;
+type cm_themes_service, system_api_service, system_server_service, service_manager_type;
+type cm_iconcache_service, system_api_service, system_server_service, service_manager_type;
diff --git a/sepolicy/service_contexts b/sepolicy/service_contexts
index 4baf0f8..04efc6f 100644
--- a/sepolicy/service_contexts
+++ b/sepolicy/service_contexts
@@ -9,3 +9,5 @@ cmtelephonymanager u:object_r:cm_telephony_service:s0
cmhardware u:object_r:cm_hardware_service:s0
cmappsuggest u:object_r:cm_app_suggest_service:s0
cmperformance u:object_r:cm_performance_service:s0
+cmthemes u:object_r:cm_themes_service:s0
+cmiconcache u:object_r:cm_iconcache_service:s0
diff --git a/sepolicy/su.te b/sepolicy/su.te
index 9cd6345..473386b 100644
--- a/sepolicy/su.te
+++ b/sepolicy/su.te
@@ -64,4 +64,6 @@ userdebug_or_eng(`
allow system_app superuser_device:sock_file { read write create setattr unlink getattr };
allow system_app sudaemon:unix_stream_socket { connectto read write setopt ioctl };
allow system_app superuser_device:dir { create rw_dir_perms setattr unlink };
+
+ allow kernel sudaemon:fd { use };
')