summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLinux Build Service Account <lnxbuild@localhost>2018-03-07 15:02:50 -0800
committerGerrit - the friendly Code Review server <code-review@localhost>2018-03-07 15:02:50 -0800
commit0eba3995a68776c7ac5dfe825e11a17878de0695 (patch)
tree06559a7d2ec740f8e9f4513b510656a7793cee85
parent84bb155d0806882a32010a0518ad5786c79d0a1c (diff)
parent3c1bce448c926e3a1a89aa5ae46e587023d406b2 (diff)
downloadandroid_device_qcom_sepolicy-0eba3995a68776c7ac5dfe825e11a17878de0695.tar.gz
android_device_qcom_sepolicy-0eba3995a68776c7ac5dfe825e11a17878de0695.tar.bz2
android_device_qcom_sepolicy-0eba3995a68776c7ac5dfe825e11a17878de0695.zip
Merge "sesepolicy: Add permission to spdaemon to access SSR channel"
-rw-r--r--common/device.te3
-rw-r--r--common/file_contexts1
-rw-r--r--common/spdaemon.te3
3 files changed, 7 insertions, 0 deletions
diff --git a/common/device.te b/common/device.te
index f4dea16d..1d919f78 100644
--- a/common/device.te
+++ b/common/device.te
@@ -100,6 +100,9 @@ type sec_nvm_device, dev_type;
# Define cryptoapp device
type cryptoapp_device, dev_type;
+# Define spdaemon_ssr device
+type spdaemon_ssr_device, dev_type;
+
# Define qsee_ipc_irq_spss device
type qsee_ipc_irq_spss_device, dev_type;
diff --git a/common/file_contexts b/common/file_contexts
index f2b3c339..6cb0cf4a 100644
--- a/common/file_contexts
+++ b/common/file_contexts
@@ -23,6 +23,7 @@
/dev/sec_nvm_.* u:object_r:sec_nvm_device:s0
/dev/sp_keymaster u:object_r:sp_keymaster_device:s0
/dev/cryptoapp u:object_r:cryptoapp_device:s0
+/dev/spdaemon_ssr u:object_r:spdaemon_ssr_device:s0
/dev/qsee_ipc_irq_spss u:object_r:qsee_ipc_irq_spss_device:s0
/dev/radio0 u:object_r:fm_radio_device:s0
/dev/btpower u:object_r:bt_device:s0
diff --git a/common/spdaemon.te b/common/spdaemon.te
index fc018343..30292bfa 100644
--- a/common/spdaemon.te
+++ b/common/spdaemon.te
@@ -47,6 +47,9 @@ allow spdaemon sp_keymaster_device:chr_file rw_file_perms;
# Allow access to cryptoapp device
allow spdaemon cryptoapp_device:chr_file rw_file_perms;
+# Allow access to spdaemon_ssr device
+allow spdaemon spdaemon_ssr_device:chr_file rw_file_perms;
+
# Allow access to ion device
allow spdaemon ion_device:chr_file rw_file_perms;