diff --git a/non_plat/app.te b/non_plat/app.te index b151f4b..3b1ffe0 100644 --- a/non_plat/app.te +++ b/non_plat/app.te @@ -31,6 +31,7 @@ allowxperm appdomain proc_perfmgr:file ioctl { # Date : W19.4 # Purpose : Allow MDP user access mdp driver allow appdomain mdp_device:chr_file rw_file_perms; +allow appdomain mtk_mdp_device:chr_file rw_file_perms; # Date : W19.23 # Operation : Migration diff --git a/non_plat/atci_service.te b/non_plat/atci_service.te index e455ad6..40bfb66 100644 --- a/non_plat/atci_service.te +++ b/non_plat/atci_service.te @@ -115,6 +115,7 @@ allow atci_service hidl_allocator_hwservice:hwservice_manager find; allow atci_service hidl_memory_hwservice:hwservice_manager find; allow atci_service ion_device:chr_file { read ioctl open }; allow atci_service mtk_cmdq_device:chr_file { read ioctl open }; +allow atci_service mtk_mdp_device:chr_file rw_file_perms; allow atci_service mtk_hal_power:binder call; allow atci_service mtk_hal_power_hwservice:hwservice_manager find; allow atci_service sysfs_batteryinfo:dir search; diff --git a/non_plat/factory.te b/non_plat/factory.te index 6718d62..14c4c54 100644 --- a/non_plat/factory.te +++ b/non_plat/factory.te @@ -278,6 +278,7 @@ hal_client_domain(factory, hal_nfc); # Operation : O Migration # Purpose: Allow to access cmdq driver allow factory mtk_cmdq_device:chr_file { read ioctl open }; +allow factory mtk_mdp_device:chr_file rw_file_perms; # Date: WK1733 # Purpose: add selinux policy to stop 'ccci_fsd' for clear emmc in factory mode diff --git a/non_plat/hal_graphics_composer_default.te b/non_plat/hal_graphics_composer_default.te index 2f4c397..009ab61 100644 --- a/non_plat/hal_graphics_composer_default.te +++ b/non_plat/hal_graphics_composer_default.te @@ -42,7 +42,7 @@ set_prop(hal_graphics_composer_default, graphics_hwc_latch_unsignaled_prop) # Date : WK18.03 # Purpose: Allow to access property dev/mdp_sync -allow hal_graphics_composer_default mtk_mdp_device:chr_file { read write open ioctl }; +allow hal_graphics_composer_default mtk_mdp_device:chr_file rw_file_perms; allow hal_graphics_composer_default mdp_device:chr_file rw_file_perms; allow hal_graphics_composer_default tee_device:chr_file rw_file_perms; allowxperm hal_graphics_composer_default proc_ged:file ioctl { proc_ged_ioctls }; diff --git a/non_plat/mediacodec.te b/non_plat/mediacodec.te index fe542c1..7edfc22 100644 --- a/non_plat/mediacodec.te +++ b/non_plat/mediacodec.te @@ -118,6 +118,7 @@ allow mediacodec debugfs_ion:dir search; # Operation : O Migration # Purpose: Allow mediacodec to access cmdq driver allow mediacodec mtk_cmdq_device:chr_file { read ioctl open }; +allow mediacodec mtk_mdp_device:chr_file rw_file_perms; # Date : WK17.28 # Operation : MT6757 SQC diff --git a/non_plat/mediaserver.te b/non_plat/mediaserver.te index f1aff36..56af7ad 100644 --- a/non_plat/mediaserver.te +++ b/non_plat/mediaserver.te @@ -295,6 +295,7 @@ allow mediaserver camera_owe_device:chr_file rw_file_perms; # Operation : O Migration # Purpose: Allow to access cmdq driver allow mediaserver mtk_cmdq_device:chr_file { read ioctl open }; +allow mediaserver mtk_mdp_device:chr_file rw_file_perms; # Date : WK17.43 # Operation : Migration diff --git a/non_plat/mtk_hal_camera.te b/non_plat/mtk_hal_camera.te index 16516e6..dae9d54 100644 --- a/non_plat/mtk_hal_camera.te +++ b/non_plat/mtk_hal_camera.te @@ -269,6 +269,7 @@ allow mtk_hal_camera property_socket:sock_file write; # Operation : O Migration # Purpose: Allow to access cmdq driver allow mtk_hal_camera mtk_cmdq_device:chr_file { read ioctl open }; +allow mtk_hal_camera mtk_mdp_device:chr_file rw_file_perms; # Date : WK17.36 # Operation : O Migration diff --git a/non_plat/mtk_hal_mms.te b/non_plat/mtk_hal_mms.te index e15dabe..4f91b42 100755 --- a/non_plat/mtk_hal_mms.te +++ b/non_plat/mtk_hal_mms.te @@ -28,6 +28,7 @@ add_hwservice(hal_mms_server, mtk_hal_mms_hwservice) allow mtk_hal_mms graphics_device:chr_file { read write open ioctl }; allow mtk_hal_mms ion_device:chr_file { read open ioctl }; allow mtk_hal_mms mtk_cmdq_device:chr_file { read open ioctl }; +allow mtk_hal_mms mtk_mdp_device:chr_file rw_file_perms; allow mtk_hal_mms mtk_hal_pq_hwservice:hwservice_manager find; allow mtk_hal_mms proc:file r_file_perms;