From 296ac19157686f776999095924afef34cca80ca0 Mon Sep 17 00:00:00 2001 From: Deokgyu Yang Date: Wed, 26 May 2021 03:12:56 +0900 Subject: [PATCH] gts3l: adsprpcd: Try to import previous settings but it doesn't work Keep it exists because it is not harmful Signed-off-by: Deokgyu Yang Change-Id: I919ea9ff8480d017e2958f53d82f3715420a7964 --- rootdir/etc/init.qcom.rc | 1 + rootdir/etc/init.target.rc | 12 +----------- sepolicy/adsprpcd.te | 4 ++++ sepolicy/file.te | 1 + sepolicy/init.te | 1 + 5 files changed, 8 insertions(+), 11 deletions(-) diff --git a/rootdir/etc/init.qcom.rc b/rootdir/etc/init.qcom.rc index 7cc8f62..a292b2f 100644 --- a/rootdir/etc/init.qcom.rc +++ b/rootdir/etc/init.qcom.rc @@ -63,6 +63,7 @@ on early-boot # set RLIMIT_MEMLOCK to 64MB setrlimit 8 67108864 67108864 # Allow subsystem (modem etc) debugging + chown root audio /sys/kernel/boot_adsp/boot write /sys/kernel/boot_adsp/boot 1 write /sys/kernel/boot_cdsp/boot 1 write /sys/kernel/boot_slpi/boot 1 diff --git a/rootdir/etc/init.target.rc b/rootdir/etc/init.target.rc index 85b59d3..616ab57 100644 --- a/rootdir/etc/init.target.rc +++ b/rootdir/etc/init.target.rc @@ -319,21 +319,11 @@ service thermal-engine /vendor/bin/thermal-engine # group media # -service adsprpcd /vendor/bin/adsprpcd rootpd - class main - user system - group system - -service adsprpcd_audiopd /vendor/bin/adsprpcd audiopd +service adsprpcd /vendor/bin/adsprpcd class main user media group media -service adsprpcd_sensorspd /vendor/bin/adsprpcd sensorspd - class core - user system - group system - #service audiod /system/vendor/bin/audiod # class late_start # user system diff --git a/sepolicy/adsprpcd.te b/sepolicy/adsprpcd.te index 3f7c671..ba721f4 100644 --- a/sepolicy/adsprpcd.te +++ b/sepolicy/adsprpcd.te @@ -4,3 +4,7 @@ allow adsprpcd mnt_vendor_file:file create_file_perms; allow adsprpcd sysfs_sensors:dir r_dir_perms; allow adsprpcd sysfs_sensors:file r_file_perms; allow adsprpcd sysfs_sensors:lnk_file r_file_perms; + +allow adsprpcd dsp_file:dir r_dir_perms; +allow adsprpcd dsp_file:file r_file_perms; +allow adsprpcd unlabeled:file { getattr open read }; diff --git a/sepolicy/file.te b/sepolicy/file.te index a1a013c..a272cc1 100644 --- a/sepolicy/file.te +++ b/sepolicy/file.te @@ -52,3 +52,4 @@ type sysfs_lcd_writable, fs_type, sysfs_type; type sysfs_mdnie_writable, fs_type, sysfs_type; type sysfs_tsp, fs_type, sysfs_type; type sysfs_wifi, fs_type, sysfs_type; +type dsp_file, fs_type, contextmount_type; diff --git a/sepolicy/init.te b/sepolicy/init.te index 6a2e001..e337a36 100644 --- a/sepolicy/init.te +++ b/sepolicy/init.te @@ -1,5 +1,6 @@ allow init efs_file:dir mounton; allow init omr_file:dir mounton; allow init vendor_firmware_file:file mounton; +allow init dsp_file:dir mounton; allow init socket_device:sock_file create;