Merge "Allow Exoplayer access to the vstream-secure heap for secure playback" into sc-dev
This commit is contained in:
commit
d70813575b
2 changed files with 6 additions and 0 deletions
2
whitechapel/vendor/google/file_contexts
vendored
2
whitechapel/vendor/google/file_contexts
vendored
|
@ -412,6 +412,8 @@
|
|||
/dev/dma_heap/video_system u:object_r:dmabuf_system_heap_device:s0
|
||||
/dev/dma_heap/video_system-uncached u:object_r:dmabuf_system_heap_device:s0
|
||||
|
||||
/dev/dma_heap/vstream-secure u:object_r:dmabuf_system_secure_heap_device:s0
|
||||
|
||||
# Video sysfs files
|
||||
/sys/devices/platform/mfc/video4linux/video6/name u:object_r:sysfs_video:s0
|
||||
/sys/devices/platform/mfc/video4linux/video7/name u:object_r:sysfs_video:s0
|
||||
|
|
|
@ -4,3 +4,7 @@ allow untrusted_app_all edgetpu_service:service_manager find;
|
|||
# Allows applications to access the EdgeTPU device, except open, which is guarded
|
||||
# by the EdgeTPU service.
|
||||
allow untrusted_app_all edgetpu_device:chr_file { getattr read write ioctl map };
|
||||
|
||||
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
|
||||
# for secure video playback
|
||||
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue