Merge "Allow Exoplayer access to the vstream-secure heap for secure playback" into sc-dev

This commit is contained in:
TreeHugger Robot 2021-03-24 00:26:19 +00:00 committed by Android (Google) Code Review
commit d70813575b
2 changed files with 6 additions and 0 deletions

View file

@ -412,6 +412,8 @@
/dev/dma_heap/video_system u:object_r:dmabuf_system_heap_device:s0
/dev/dma_heap/video_system-uncached u:object_r:dmabuf_system_heap_device:s0
/dev/dma_heap/vstream-secure u:object_r:dmabuf_system_secure_heap_device:s0
# Video sysfs files
/sys/devices/platform/mfc/video4linux/video6/name u:object_r:sysfs_video:s0
/sys/devices/platform/mfc/video4linux/video7/name u:object_r:sysfs_video:s0

View file

@ -4,3 +4,7 @@ allow untrusted_app_all edgetpu_service:service_manager find;
# Allows applications to access the EdgeTPU device, except open, which is guarded
# by the EdgeTPU service.
allow untrusted_app_all edgetpu_device:chr_file { getattr read write ioctl map };
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
# for secure video playback
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;