mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
9a6c3f99ed
- No patches were found with incorrect authorship/From: lines - The older AndroidHardening patch repos are no longer available to verify CID. - New GrapheneOS patches do not include a CID. - *Signature_Spoofing.patch CID could not be found. - Fixed CID of *Harden_Sig_Spoofing.patch to match 14.1 - Fixed CID of *LGE_Fixes.patch to match 14.1 - Fixed CID of *Harden.patch to match 14.1 - Added edit note to *Harden.patch - Fixed CID of *PREREQ_Handle_All_Modes.patch to match 14.1 - Fixed CID of *More_Preferred_Network_Modes.patch to match 14.1 - Fixed CID of *AES256.patch to match 14.1 - Fixed CID of *0001-OTA_Keys.patch to match 18.1 - Fixed CID of *Camera_Fix.patch to match 15.1 - Fixed CID of *Connectivity.patch to match 14.1 - Fixed CID of *Fix_Calling.patch to match 14.1 - Fixed CID of *Remove_Analytics.patch to match 14.1 - Fixed CID of Unused-*.patch/audio_extn to match original Signed-off-by: Tad <tad@spotco.us>
32 lines
1.1 KiB
Diff
32 lines
1.1 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Tad <tad@spotco.us>
|
|
Date: Wed, 15 Mar 2017 12:51:35 -0400
|
|
Subject: [PATCH] TEMPORARY fix camera not working on user builds
|
|
|
|
Change-Id: I61e8c78bfd70be7c157c049dac201de21749d4a2
|
|
---
|
|
common/mediaserver.te | 10 ++++------
|
|
1 file changed, 4 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/common/mediaserver.te b/common/mediaserver.te
|
|
index caf7f646..df78c916 100644
|
|
--- a/common/mediaserver.te
|
|
+++ b/common/mediaserver.te
|
|
@@ -13,12 +13,10 @@ binder_call(mediaserver, rild)
|
|
qmux_socket(mediaserver)
|
|
allow mediaserver camera_data_file:sock_file w_file_perms;
|
|
|
|
-userdebug_or_eng(`
|
|
- allow mediaserver camera_data_file:dir rw_dir_perms;
|
|
- allow mediaserver camera_data_file:file create_file_perms;
|
|
- # Access to audio
|
|
- #allow mediaserver debugfs:file rw_file_perms;
|
|
-')
|
|
+allow mediaserver camera_data_file:dir rw_dir_perms;
|
|
+allow mediaserver camera_data_file:file create_file_perms;
|
|
+# Access to audio
|
|
+#allow mediaserver debugfs:file rw_file_perms;
|
|
|
|
r_dir_file(mediaserver, sysfs_esoc)
|
|
allow mediaserver system_app_data_file:file rw_file_perms;
|