diff options
author | forkbomb <keepcalm444@gmail.com> | 2015-11-27 23:53:05 +1100 |
---|---|---|
committer | Simon Shields <keepcalm444@gmail.com> | 2015-12-11 10:57:35 +1100 |
commit | 8d8ac23e55c865ce1d8f245f4ddea27792667688 (patch) | |
tree | bf3ed5619df7484368b9db623e83b94847e7e942 /selinux/system_server.te | |
parent | 808d0b578511aac96a32101c3df523e6fed5b0d8 (diff) | |
download | device_samsung_i9300-8d8ac23e55c865ce1d8f245f4ddea27792667688.zip device_samsung_i9300-8d8ac23e55c865ce1d8f245f4ddea27792667688.tar.gz device_samsung_i9300-8d8ac23e55c865ce1d8f245f4ddea27792667688.tar.bz2 |
i9300: M sepolicy bringup
GPS fixes taken from grouper:
https://github.com/CyanogenMod/android_device_asus_grouper/commit/9651b24fb481bf0fc1db3b1d700033cf66eb067e
and
https://github.com/CyanogenMod/android_device_asus_grouper/commit/f5592571d581478622f0fc3f86fbbddf20cf89c7
Change-Id: I7ec658691c65c3b6c087ee41ba69f2cb37ade525
Diffstat (limited to 'selinux/system_server.te')
-rw-r--r-- | selinux/system_server.te | 13 |
1 files changed, 8 insertions, 5 deletions
diff --git a/selinux/system_server.te b/selinux/system_server.te index 28085f4..b9cc2f2 100644 --- a/selinux/system_server.te +++ b/selinux/system_server.te @@ -10,18 +10,21 @@ allow system_server efs_file:dir search; allow system_server efs_file:file read; allow system_server efs_device_file:dir search; allow system_server uhid_device:chr_file { read ioctl write open }; +allow system_server storage_stub_file:dir getattr; + + +# for sensors +allow system_server system_file:file execmod; # /efs/wifi/.mac.info allow system_server wifi_data_file:file { read open }; -#allow system_server default_prop:property_service set; - -allow system_server gpsd:binder transfer; +allow system_server glgps:binder transfer; type_transition system_server system_data_file:fifo_file gps_data_file ".gps.interface.pipe.to_jni"; # Access .gps.interface.pipe.to_gpsd. -allow system_server gps_data_file:dir search; -allow system_server gps_data_file:fifo_file { write setattr rw_file_perms }; +allow system_server gps_data_file:dir rw_dir_perms; +allow system_server gps_data_file:fifo_file { setattr rw_file_perms create }; # Access /data/sensors/gps* socket allow system_server gps_data_file:sock_file create_file_perms; |