Merge "Allow priv_apps to stat files on the system partition"
diff --git a/bootanim.te b/bootanim.te
index 9e04c04..ee5bcae 100644
--- a/bootanim.te
+++ b/bootanim.te
@@ -1,5 +1,5 @@
# bootanimation oneshot service
-type bootanim, domain, domain_deprecated;
+type bootanim, domain;
type bootanim_exec, exec_type, file_type;
init_daemon_domain(bootanim)
@@ -17,3 +17,24 @@
allow bootanim audio_device:chr_file rw_file_perms;
allow bootanim surfaceflinger_service:service_manager find;
+
+# For /acct/uid/*/tasks.
+allow bootanim cgroup:dir { search write };
+allow bootanim cgroup:file w_file_perms;
+
+# debugfs access
+allow bootanim debugfs:dir r_dir_perms;
+allow bootanim debugfs:file w_file_perms;
+
+# Allow access to ion memory allocation device
+allow bootanim ion_device:chr_file rw_file_perms;
+
+# Read access to pseudo filesystems.
+r_dir_file(bootanim, proc)
+r_dir_file(bootanim, sysfs)
+r_dir_file(bootanim, sysfs_devices_system_cpu)
+r_dir_file(bootanim, cgroup)
+allow bootanim proc_cpuinfo:file r_file_perms;
+
+# System file accesses.
+allow bootanim system_file:dir r_dir_perms;
diff --git a/shell.te b/shell.te
index a02fbd0..a8089d6 100644
--- a/shell.te
+++ b/shell.te
@@ -71,6 +71,7 @@
# Directory read access and file write access is already granted
# in domain.te.
allow shell debugfs:file r_file_perms;
+allow shell debugfs:dir search;
allow shell atrace_exec:file rx_file_perms;
userdebug_or_eng(`
@@ -113,3 +114,6 @@
# bugs, so we want to ensure the shell user never has this
# capability.
neverallow shell file_type:file link;
+
+# Allow access to ion memory allocation device.
+allow shell ion_device:chr_file { open read };