DivestOS/Patches/LineageOS-14.1/android_device_qcom_sepolicy/0001-Camera_Fix.patch
Tad 9a6c3f99ed Verify authorship and Change-Id of all contained patches
- No patches were found with incorrect authorship/From: lines
- The older AndroidHardening patch repos are no longer available to verify CID.
- New GrapheneOS patches do not include a CID.
- *Signature_Spoofing.patch CID could not be found.
- Fixed CID of *Harden_Sig_Spoofing.patch to match 14.1
- Fixed CID of *LGE_Fixes.patch to match 14.1
- Fixed CID of *Harden.patch to match 14.1
- Added edit note to *Harden.patch
- Fixed CID of *PREREQ_Handle_All_Modes.patch to match 14.1
- Fixed CID of *More_Preferred_Network_Modes.patch to match 14.1
- Fixed CID of *AES256.patch to match 14.1
- Fixed CID of *0001-OTA_Keys.patch to match 18.1
- Fixed CID of *Camera_Fix.patch to match 15.1
- Fixed CID of *Connectivity.patch to match 14.1
- Fixed CID of *Fix_Calling.patch to match 14.1
- Fixed CID of *Remove_Analytics.patch to match 14.1
- Fixed CID of Unused-*.patch/audio_extn to match original

Signed-off-by: Tad <tad@spotco.us>
2022-03-05 13:13:30 -05:00

32 lines
1.1 KiB
Diff

From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Tad <tad@spotco.us>
Date: Wed, 15 Mar 2017 12:51:35 -0400
Subject: [PATCH] TEMPORARY fix camera not working on user builds
Change-Id: I61e8c78bfd70be7c157c049dac201de21749d4a2
---
common/mediaserver.te | 10 ++++------
1 file changed, 4 insertions(+), 6 deletions(-)
diff --git a/common/mediaserver.te b/common/mediaserver.te
index caf7f646..df78c916 100644
--- a/common/mediaserver.te
+++ b/common/mediaserver.te
@@ -13,12 +13,10 @@ binder_call(mediaserver, rild)
qmux_socket(mediaserver)
allow mediaserver camera_data_file:sock_file w_file_perms;
-userdebug_or_eng(`
- allow mediaserver camera_data_file:dir rw_dir_perms;
- allow mediaserver camera_data_file:file create_file_perms;
- # Access to audio
- #allow mediaserver debugfs:file rw_file_perms;
-')
+allow mediaserver camera_data_file:dir rw_dir_perms;
+allow mediaserver camera_data_file:file create_file_perms;
+# Access to audio
+#allow mediaserver debugfs:file rw_file_perms;
r_dir_file(mediaserver, sysfs_esoc)
allow mediaserver system_app_data_file:file rw_file_perms;