Allow tachyon service to make binder calls to GCA
This permission is needed for tachyon service to call callbacks. AVC Error seen when tachyon tries accessing GCA: 12-02 11:40:03.212 6987 6987 W com.google.edge: type=1400 audit(0.0:17): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0 12-03 07:12:26.424 4166 4166 W com.google.edge: type=1400 audit(0.0:254): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0 Bug: 381787911 Flag: EXEMPT updates device sepolicy only Change-Id: Iaa61d70cdffb75024c497482f4c0a6cab493bec3
This commit is contained in:
parent
fb4abe21a2
commit
1e5b6fb9eb
2 changed files with 8 additions and 1 deletions
6
vendor/debug_camera_app.te
vendored
6
vendor/debug_camera_app.te
vendored
|
@ -1,4 +1,8 @@
|
|||
# File containing sepolicies for GCA-Eng & GCA-Next.
|
||||
userdebug_or_eng(`
|
||||
# Allows GCA_Eng & GCA-Next to access the hw_jpeg /dev/video12.
|
||||
allow debug_camera_app hw_jpg_device:chr_file rw_file_perms;
|
||||
')
|
||||
|
||||
# Allows tachyon_service to communicate with GCA-Eng via binder.
|
||||
binder_call(edgetpu_tachyon_server, debug_camera_app);
|
||||
')
|
||||
|
|
3
vendor/google_camera_app.te
vendored
3
vendor/google_camera_app.te
vendored
|
@ -8,3 +8,6 @@ allow google_camera_app edgetpu_device:chr_file { getattr read write ioctl map }
|
|||
|
||||
# Allows GCA to access the hw_jpeg /dev/video12.
|
||||
allow google_camera_app hw_jpg_device:chr_file rw_file_perms;
|
||||
|
||||
# Allows tachyon service to communicate with google_camera_app via binder.
|
||||
binder_call(edgetpu_tachyon_server, google_camera_app);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue