Merge "[ALPS03800946] Remove data_between_core_and_vendor_violators" into alps-trunk-p0.basic

Change-Id: I82c81a0dd1482265175253fd6bf2825d941c74cf
MTK-Commit-Id: 46e7678936d83a74b8b07ad14815905718119c25
This commit is contained in:
Iris Chang 2020-01-18 09:49:41 +08:00 committed by Gerrit Code Review
commit 4ab7553919
7 changed files with 2 additions and 9 deletions

View File

@ -74,7 +74,6 @@ allow factory vendor_factory_idle_state_prop:property_service set;
# Date: WK15.46 # Date: WK15.46
# Purpose: gps factory mode # Purpose: gps factory mode
####typeattribute factory data_between_core_and_vendor_violators;
###allow factory agpsd_data_file:dir search; ###allow factory agpsd_data_file:dir search;
allow factory apk_data_file:dir write; allow factory apk_data_file:dir write;
#allow factory gps_data_file:dir r_dir_perms; #allow factory gps_data_file:dir r_dir_perms;

View File

@ -53,7 +53,6 @@ allow fuelgauged self:netlink_route_socket { bind create getattr write nlmsg_rea
# Purpose : For fg daemon can access /data/FG folder # Purpose : For fg daemon can access /data/FG folder
#file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file); #file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
#allow fuelgauged fuelgauged_file:file rw_file_perms; #allow fuelgauged fuelgauged_file:file rw_file_perms;
#typeattribute fuelgauged data_between_core_and_vendor_violators;
#allow fuelgauged system_data_file:dir rw_dir_perms; #allow fuelgauged system_data_file:dir rw_dir_perms;
# Data : WK16.21 # Data : WK16.21

View File

@ -27,7 +27,6 @@ init_daemon_domain(fuelgauged_nvram)
# Purpose : For fg daemon can access /data/FG folder # Purpose : For fg daemon can access /data/FG folder
#file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file); #file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
#allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms; #allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
#typeattribute fuelgauged_nvram data_between_core_and_vendor_violators;
#allow fuelgauged_nvram system_data_file:dir rw_dir_perms; #allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
# Data : WK16.21 # Data : WK16.21

View File

@ -40,7 +40,6 @@ allow nvram_agent_binder init:unix_stream_socket connectto;
allow nvram_agent_binder property_socket:sock_file write; allow nvram_agent_binder property_socket:sock_file write;
allow nvram_agent_binder sysfs:file write; allow nvram_agent_binder sysfs:file write;
#allow nvram_agent_binder self:capability { fowner chown dac_override fsetid }; #allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
#typeattribute nvram_agent_binder data_between_core_and_vendor_violators;
#remove from Android P #remove from Android P
#allow nvram_agent_binder system_data_file:dir create_file_perms; #allow nvram_agent_binder system_data_file:dir create_file_perms;
@ -71,4 +70,4 @@ hal_server_domain(nvram_agent_binder, hal_nvramagent)
# Date : WK18.16 # Date : WK18.16
# Operation: P migration # Operation: P migration
# Purpose: Allow nvram_daemon to get tel_switch_prop # Purpose: Allow nvram_daemon to get tel_switch_prop
get_prop(nvram_daemon, tel_switch_prop) get_prop(nvram_daemon, tel_switch_prop)

View File

@ -70,7 +70,6 @@ allow nvram_daemon proc_lk_env:file rw_file_perms;
# Purpose: for workaround # Purpose: for workaround
# Todo: Remove this policy # Todo: Remove this policy
#typeattribute nvram_daemon data_between_core_and_vendor_violators;
#remove from Android P #remove from Android P
#allow nvram_daemon system_data_file:dir write; #allow nvram_daemon system_data_file:dir write;
@ -105,4 +104,4 @@ allow nvram_daemon sysfs:file read;
# Date : WK18.16 # Date : WK18.16
# Operation: P migration # Operation: P migration
# Purpose: Allow nvram_daemon to get tel_switch_prop # Purpose: Allow nvram_daemon to get tel_switch_prop
get_prop(nvram_daemon, tel_switch_prop) get_prop(nvram_daemon, tel_switch_prop)

View File

@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
init_daemon_domain(kisd) init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl}; allow kisd tee_device:chr_file {read write open ioctl};
#typeattribute kisd data_between_core_and_vendor_violators;
allow kisd provision_file:dir {read write open ioctl add_name search remove_name}; allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink}; allow kisd provision_file:file {create read write open getattr unlink};
allow kisd system_file:file {execute_no_trans}; allow kisd system_file:file {execute_no_trans};

View File

@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
init_daemon_domain(kisd) init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl}; allow kisd tee_device:chr_file {read write open ioctl};
typeattribute kisd data_between_core_and_vendor_violators;
allow kisd provision_file:dir {read write open ioctl add_name search remove_name}; allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink}; allow kisd provision_file:file {create read write open getattr unlink};
allow kisd system_file:file {execute_no_trans}; allow kisd system_file:file {execute_no_trans};