sepolicy : Allow apps to have read access to vendor_display_prop
Change-Id: Ib2793107a54fa1a2df60ac872645277a9a0b2415
This commit is contained in:
parent
36ea3c2980
commit
8569f71b88
1 changed files with 7 additions and 0 deletions
7
legacy/vendor/common/app.te
vendored
7
legacy/vendor/common/app.te
vendored
|
@ -24,6 +24,10 @@
|
||||||
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
#
|
||||||
|
# Changes from Qualcomm Innovation Center are provided under the following license:
|
||||||
|
# Copyright (c) 2023 Qualcomm Innovation Center, Inc. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: BSD-3-Clause-Clear
|
||||||
|
|
||||||
#Allow all apps to open and send ioctl to qdsp device
|
#Allow all apps to open and send ioctl to qdsp device
|
||||||
allow appdomain qdsp_device:chr_file r_file_perms;
|
allow appdomain qdsp_device:chr_file r_file_perms;
|
||||||
|
@ -39,3 +43,6 @@ allow appdomain qti_logkit_pub_socket:dir r_dir_perms;
|
||||||
|
|
||||||
# Allow all apps to open and send ioctl to npu device
|
# Allow all apps to open and send ioctl to npu device
|
||||||
allow appdomain npu_device:chr_file r_file_perms;
|
allow appdomain npu_device:chr_file r_file_perms;
|
||||||
|
|
||||||
|
#Allow all apps to have read access to vendor_display_prop
|
||||||
|
get_prop(appdomain, vendor_display_prop)
|
||||||
|
|
Loading…
Reference in a new issue