diff --git a/non_plat/file_contexts b/non_plat/file_contexts index 92638b4..a7885a3 100644 --- a/non_plat/file_contexts +++ b/non_plat/file_contexts @@ -537,7 +537,6 @@ /(system\/vendor|vendor)/bin/lbs_hidl_service u:object_r:lbs_hidl_service_exec:s0 /(system\/vendor|vendor)/bin/wmt_loader u:object_r:wmt_loader_exec:s0 -/(system\/vendor|vendor)/bin/md_ctrl u:object_r:md_ctrl_exec:s0 /(system\/vendor|vendor)/bin/spm_loader u:object_r:spm_loader_exec:s0 /(system\/vendor|vendor)/bin/ccci_mdinit u:object_r:ccci_mdinit_exec:s0 diff --git a/non_plat/md_ctrl.te b/non_plat/md_ctrl.te deleted file mode 100644 index d59d6df..0000000 --- a/non_plat/md_ctrl.te +++ /dev/null @@ -1,30 +0,0 @@ -# ============================================== -# Policy File of /system/bin/md_ctrl Executable File - -# ============================================== -# Type Declaration -# ============================================== -type md_ctrl, domain; -type md_ctrl_exec, exec_type, file_type, vendor_file_type; - -# ============================================== -# MTK Policy Rule -# ============================================== -# Date : WK14.46 -# Operation : Migration -# Purpose : Start md_ctrl - -init_daemon_domain(md_ctrl) -allow md_ctrl ccci_device:chr_file { rw_file_perms }; -allow md_ctrl devpts:chr_file { rw_file_perms }; -#allow md_ctrl self:capability dac_override; -allow md_ctrl muxreport_exec:file rx_file_perms; -allow md_ctrl emd_device:chr_file { rw_file_perms }; -allow md_ctrl eemcs_device:chr_file { rw_file_perms }; - -# Needed to set vold.encryption.type -#set_prop(md_ctrl, vold_prop) - -# Allow read to sys/kernel/ccci/* files -allow md_ctrl sysfs_ccci:dir search; -allow md_ctrl sysfs_ccci:file r_file_perms; diff --git a/non_plat/vold.te b/non_plat/vold.te index d01a5d1..118033f 100644 --- a/non_plat/vold.te +++ b/non_plat/vold.te @@ -9,14 +9,6 @@ # Purpose : unmount /mnt/cd-rom. It causes by unmountAll() when VolumeManager starts allow vold iso9660:filesystem unmount; -# Date : WK16.19 -# Operation : Migration -# Purpose : dotrim for the mountpoints in fstab -typeattribute vold data_between_core_and_vendor_violators; -allow vold nvdata_file:dir r_dir_perms; -allow vold protect_f_data_file:dir r_dir_perms; -allow vold protect_s_data_file:dir r_dir_perms; - # Date : WK16.19 # Operation : Migration # Purpose : vold will traverse /proc when remountUid(). diff --git a/plat_private/vold.te b/plat_private/vold.te deleted file mode 100644 index 4ae70b9..0000000 --- a/plat_private/vold.te +++ /dev/null @@ -1,8 +0,0 @@ -# ============================================== -# MTK Policy Rule -# ============================================== - -# volume manager - -#============= vold ============== -#allow vold debugfs_tracing:file write; diff --git a/prebuilts/api/26.0/plat_private/vold.te b/prebuilts/api/26.0/plat_private/vold.te deleted file mode 100755 index 4ae70b9..0000000 --- a/prebuilts/api/26.0/plat_private/vold.te +++ /dev/null @@ -1,8 +0,0 @@ -# ============================================== -# MTK Policy Rule -# ============================================== - -# volume manager - -#============= vold ============== -#allow vold debugfs_tracing:file write;