diff options
author | Avijit Kanti Das <avijitnsec@codeaurora.org> | 2014-11-06 23:35:45 -0800 |
---|---|---|
committer | Avijit Kanti Das <avijitnsec@codeaurora.org> | 2014-11-12 11:55:13 -0800 |
commit | f58a80302a162bff01dd337d209e4681e508177f (patch) | |
tree | 6728813710634fd1798e7afb36c524d1dc57679b /common | |
parent | b73cff1f7b83add4a815fb2d768194c3174d56c1 (diff) | |
download | android_device_qcom_sepolicy-f58a80302a162bff01dd337d209e4681e508177f.tar.gz android_device_qcom_sepolicy-f58a80302a162bff01dd337d209e4681e508177f.tar.bz2 android_device_qcom_sepolicy-f58a80302a162bff01dd337d209e4681e508177f.zip |
Seandroid: Adding policy for IMS
Addressing few bootup denial from IMS
Change-Id: Ie5f258d63a32e2715e6212e6ce31540882d7e9d5
Diffstat (limited to 'common')
-rw-r--r-- | common/ims.te | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/common/ims.te b/common/ims.te index 01714869..401ee51d 100644 --- a/common/ims.te +++ b/common/ims.te @@ -10,3 +10,6 @@ allow ims ims_socket:sock_file { open read write }; allow ims property_socket:sock_file write; allow ims servicemanager:binder call; binder_use(ims) +unix_socket_connect(ims, property, init) +allow ims self:socket { read bind create write ioctl }; +allow ims system_prop:property_service set; |