gs101-sepolicy: Use untrusted_app_all for vendor_sched denials am: 2ef3daba50
am: 7b8fe23d74
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15531061 Change-Id: I2837b12374957c35725af2f4aed49ada200810ff
This commit is contained in:
commit
fa5d13d6e1
3 changed files with 2 additions and 2 deletions
1
whitechapel/vendor/google/untrusted_app.te
vendored
1
whitechapel/vendor/google/untrusted_app.te
vendored
|
@ -1 +0,0 @@
|
||||||
dontaudit untrusted_app sysfs_vendor_sched:dir search;
|
|
|
@ -1 +0,0 @@
|
||||||
dontaudit untrusted_app_29 sysfs_vendor_sched:dir search;
|
|
|
@ -1,3 +1,5 @@
|
||||||
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
|
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
|
||||||
# for secure video playback
|
# for secure video playback
|
||||||
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
||||||
|
|
||||||
|
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue