Merge "[ALPS03800946] Remove data_between_core_and_vendor_violators" into alps-trunk-p0.basic
Change-Id: I82c81a0dd1482265175253fd6bf2825d941c74cf MTK-Commit-Id: 46e7678936d83a74b8b07ad14815905718119c25
This commit is contained in:
commit
4ab7553919
@ -74,7 +74,6 @@ allow factory vendor_factory_idle_state_prop:property_service set;
|
|||||||
|
|
||||||
# Date: WK15.46
|
# Date: WK15.46
|
||||||
# Purpose: gps factory mode
|
# Purpose: gps factory mode
|
||||||
####typeattribute factory data_between_core_and_vendor_violators;
|
|
||||||
###allow factory agpsd_data_file:dir search;
|
###allow factory agpsd_data_file:dir search;
|
||||||
allow factory apk_data_file:dir write;
|
allow factory apk_data_file:dir write;
|
||||||
#allow factory gps_data_file:dir r_dir_perms;
|
#allow factory gps_data_file:dir r_dir_perms;
|
||||||
|
@ -53,7 +53,6 @@ allow fuelgauged self:netlink_route_socket { bind create getattr write nlmsg_rea
|
|||||||
# Purpose : For fg daemon can access /data/FG folder
|
# Purpose : For fg daemon can access /data/FG folder
|
||||||
#file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
|
#file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
|
||||||
#allow fuelgauged fuelgauged_file:file rw_file_perms;
|
#allow fuelgauged fuelgauged_file:file rw_file_perms;
|
||||||
#typeattribute fuelgauged data_between_core_and_vendor_violators;
|
|
||||||
#allow fuelgauged system_data_file:dir rw_dir_perms;
|
#allow fuelgauged system_data_file:dir rw_dir_perms;
|
||||||
|
|
||||||
# Data : WK16.21
|
# Data : WK16.21
|
||||||
|
@ -27,7 +27,6 @@ init_daemon_domain(fuelgauged_nvram)
|
|||||||
# Purpose : For fg daemon can access /data/FG folder
|
# Purpose : For fg daemon can access /data/FG folder
|
||||||
#file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
|
#file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
|
||||||
#allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
|
#allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
|
||||||
#typeattribute fuelgauged_nvram data_between_core_and_vendor_violators;
|
|
||||||
#allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
|
#allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
|
||||||
|
|
||||||
# Data : WK16.21
|
# Data : WK16.21
|
||||||
|
@ -40,7 +40,6 @@ allow nvram_agent_binder init:unix_stream_socket connectto;
|
|||||||
allow nvram_agent_binder property_socket:sock_file write;
|
allow nvram_agent_binder property_socket:sock_file write;
|
||||||
allow nvram_agent_binder sysfs:file write;
|
allow nvram_agent_binder sysfs:file write;
|
||||||
#allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
|
#allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
|
||||||
#typeattribute nvram_agent_binder data_between_core_and_vendor_violators;
|
|
||||||
#remove from Android P
|
#remove from Android P
|
||||||
#allow nvram_agent_binder system_data_file:dir create_file_perms;
|
#allow nvram_agent_binder system_data_file:dir create_file_perms;
|
||||||
|
|
||||||
|
@ -70,7 +70,6 @@ allow nvram_daemon proc_lk_env:file rw_file_perms;
|
|||||||
|
|
||||||
# Purpose: for workaround
|
# Purpose: for workaround
|
||||||
# Todo: Remove this policy
|
# Todo: Remove this policy
|
||||||
#typeattribute nvram_daemon data_between_core_and_vendor_violators;
|
|
||||||
#remove from Android P
|
#remove from Android P
|
||||||
#allow nvram_daemon system_data_file:dir write;
|
#allow nvram_daemon system_data_file:dir write;
|
||||||
|
|
||||||
|
@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
|
|||||||
init_daemon_domain(kisd)
|
init_daemon_domain(kisd)
|
||||||
|
|
||||||
allow kisd tee_device:chr_file {read write open ioctl};
|
allow kisd tee_device:chr_file {read write open ioctl};
|
||||||
#typeattribute kisd data_between_core_and_vendor_violators;
|
|
||||||
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
||||||
allow kisd provision_file:file {create read write open getattr unlink};
|
allow kisd provision_file:file {create read write open getattr unlink};
|
||||||
allow kisd system_file:file {execute_no_trans};
|
allow kisd system_file:file {execute_no_trans};
|
||||||
|
@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
|
|||||||
init_daemon_domain(kisd)
|
init_daemon_domain(kisd)
|
||||||
|
|
||||||
allow kisd tee_device:chr_file {read write open ioctl};
|
allow kisd tee_device:chr_file {read write open ioctl};
|
||||||
typeattribute kisd data_between_core_and_vendor_violators;
|
|
||||||
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
||||||
allow kisd provision_file:file {create read write open getattr unlink};
|
allow kisd provision_file:file {create read write open getattr unlink};
|
||||||
allow kisd system_file:file {execute_no_trans};
|
allow kisd system_file:file {execute_no_trans};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user