author | shuide.chen <shuide.chen@amlogic.com> | 2018-10-05 03:06:30 (GMT) |
---|---|---|
committer | Shuide Chen <shuide.chen@amlogic.com> | 2018-10-05 04:01:52 (GMT) |
commit | f4e4b231ae2aa2255e64a8b6b7f8a30885afd927 (patch) | |
tree | dcf8de4c16b900ab6338e5a01285534ce3fee040 | |
parent | 16b96f2a3f87484d4f1995c7bf892b456eb015db (diff) | |
download | common-f4e4b231ae2aa2255e64a8b6b7f8a30885afd927.zip common-f4e4b231ae2aa2255e64a8b6b7f8a30885afd927.tar.gz common-f4e4b231ae2aa2255e64a8b6b7f8a30885afd927.tar.bz2 |
netflix: support for ninjia6
BUG=116519164
BUG=117194391
BUG=117301098
since we redefined vendor.display-size to netflix_prop
add policy for normal app to access it.
Change-Id: I4b0d8aa51419a2f3689fbcd592a22f7e32fe99d6
Signed-off-by: shuide.chen <shuide.chen@amlogic.com>
-rw-r--r-- | sepolicy/file_contexts | 1 | ||||
-rw-r--r-- | sepolicy/hal_audio_default.te | 2 | ||||
-rwxr-xr-x | sepolicy/untrusted_app.te | 3 |
3 files changed, 5 insertions, 1 deletions
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts index f6cd585..08d8fb9 100644 --- a/sepolicy/file_contexts +++ b/sepolicy/file_contexts @@ -109,6 +109,7 @@ /sys/class/video/axis u:object_r:sysfs_video:s0 /sys/class/tsync/enable u:object_r:sysfs_video:s0 /sys/class/audiodsp/digital_raw u:object_r:sysfs_audio:s0 +/sys/class/hidraw(/.*)? u:object_r:sysfs_audio:s0 /sys/class/tsync/firstapts u:object_r:sysfs_xbmc:s0 /sys/class/tsync/pts_audio u:object_r:sysfs_xbmc:s0 /sys/class/tsync/event u:object_r:sysfs_xbmc:s0 diff --git a/sepolicy/hal_audio_default.te b/sepolicy/hal_audio_default.te index 644b995..30e1d48 100644 --- a/sepolicy/hal_audio_default.te +++ b/sepolicy/hal_audio_default.te @@ -20,3 +20,5 @@ allow hal_audio_default sysfs:file open; allow hal_audio_default device:dir read; allow hal_audio_default system_app:binder call; allow hal_audio_default hidraw_audio_device:chr_file { create read write open ioctl}; +allow hal_audio_default sysfs_audio:file rw_file_perms; +allow hal_audio_default sysfs_audio:dir r_dir_perms; diff --git a/sepolicy/untrusted_app.te b/sepolicy/untrusted_app.te index 86a699c..351aa0f 100755 --- a/sepolicy/untrusted_app.te +++ b/sepolicy/untrusted_app.te @@ -4,4 +4,5 @@ allow untrusted_app fuseblk:dir { search }; allow untrusted_app fuseblk:file { read open getattr }; allow untrusted_app vendor_file:file { read open getattr }; - +get_prop(untrusted_app, netflix_prop) +get_prop(untrusted_app_27, netflix_prop) |