Merge "sepolicy: Add sepolicy rules for wireless and cp_slave"
diff --git a/generic/vendor/common/ipacm.te b/generic/vendor/common/ipacm.te
index c09b1d6..dc40352 100644
--- a/generic/vendor/common/ipacm.te
+++ b/generic/vendor/common/ipacm.te
@@ -50,7 +50,7 @@
 allowxperm vendor_ipacm self:udp_socket ioctl SIOCGIFNAME;
 
 # Allow receiving NETLINK messages
-allow hal_tetheroffload self:netlink_route_socket { nlmsg_read create_socket_perms_no_ioctl };
+allow hal_tetheroffload self:netlink_route_socket { nlmsg_read nlmsg_readpriv create_socket_perms_no_ioctl };
 
 
 # Allow receiving NETLINK messages
diff --git a/qva/vendor/test/location_app_test.te b/qva/vendor/test/location_app_test.te
index 7149d67..d1e95da 100644
--- a/qva/vendor/test/location_app_test.te
+++ b/qva/vendor/test/location_app_test.te
@@ -52,4 +52,10 @@
     allow vendor_location_app_test self:qipcrtr_socket create_socket_perms_no_ioctl;
 
     allow vendor_location_app_test audioserver_service:service_manager find;
+
+    allow vendor_location_app_test vendor_sysfs_kgsl:file r_file_perms;
+
+    binder_call(vendor_location_app_test, gpuservice);
+
+    allow vendor_location_app_test vendor_sysfs_kgsl_gpu_model:file r_file_perms;
 ')