gs101-sepolicy: Use untrusted_app_all for vendor_sched denials am: 2ef3daba50
am: 1f4c69a11d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15531061 Change-Id: I59e7baee2e2c5a80d53b5a6f5c8712a2b09a36d3
This commit is contained in:
commit
9c7ca5fdd3
3 changed files with 2 additions and 2 deletions
1
whitechapel/vendor/google/untrusted_app.te
vendored
1
whitechapel/vendor/google/untrusted_app.te
vendored
|
@ -1 +0,0 @@
|
|||
dontaudit untrusted_app sysfs_vendor_sched:dir search;
|
|
@ -1 +0,0 @@
|
|||
dontaudit untrusted_app_29 sysfs_vendor_sched:dir search;
|
|
@ -1,3 +1,5 @@
|
|||
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
|
||||
# for secure video playback
|
||||
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
||||
|
||||
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue