diff options
| author | doc HD <doc.divxm@gmail.com> | 2015-12-08 10:48:51 +0200 |
|---|---|---|
| committer | doc HD <doc.divxm@gmail.com> | 2015-12-08 10:48:51 +0200 |
| commit | 6d8a5b6e2e0ff5bc7042363b6329157e53415d0a (patch) | |
| tree | 50dc1df67cc55b9489a0f4026554227223a2ee5c | |
| parent | b06434867c465dc2a31f377a172296f546a1dab3 (diff) | |
| parent | c35ba5f6ab65286bfeebb99dafa6fe4bf40d155f (diff) | |
Merge branch 'cm-13.0' of https://github.com/CyanogenMod/android_external_sepolicy into mm6.0
| -rw-r--r-- | binderservicedomain.te | 3 | ||||
| -rw-r--r-- | bluetooth.te | 2 | ||||
| -rw-r--r-- | untrusted_app.te | 1 |
3 files changed, 5 insertions, 1 deletions
diff --git a/binderservicedomain.te b/binderservicedomain.te index 0bfd33a..36993eb 100644 --- a/binderservicedomain.te +++ b/binderservicedomain.te @@ -13,6 +13,9 @@ allow binderservicedomain console_device:chr_file rw_file_perms; allow binderservicedomain appdomain:fd use; allow binderservicedomain appdomain:fifo_file write; +# allow all services to run permission checks +allow binderservicedomain permission_service:service_manager find; + allow binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify }; use_keystore(binderservicedomain) diff --git a/bluetooth.te b/bluetooth.te index a79023d..f77bd0d 100644 --- a/bluetooth.te +++ b/bluetooth.te @@ -70,4 +70,4 @@ allow bluetooth shell_data_file:file read; # Superuser capabilities. # bluetooth requires net_admin and wake_alarm. neverallow bluetooth self:capability ~net_admin; -neverallow bluetooth self:capability2 ~wake_alarm; +neverallow bluetooth self:capability2 ~{ wake_alarm block_suspend }; diff --git a/untrusted_app.te b/untrusted_app.te index 2aa1495..fb76317 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -84,6 +84,7 @@ allow untrusted_app cache_file:file create_file_perms; allow untrusted_app servicemanager:service_manager list; allow untrusted_app drmserver_service:service_manager find; +allow untrusted_app healthd_service:service_manager find; allow untrusted_app mediaserver_service:service_manager find; allow untrusted_app nfc_service:service_manager find; allow untrusted_app radio_service:service_manager find; |
