Merge "[ALPS03891225] Modify vold related policy" into alps-trunk-p0.basic

Change-Id: I80bcd27ca3f7cb2ef2ad0aa1521ff6b7c09fc42b
MTK-Commit-Id: 0b44547d98de2938b70ae9dcdfb1ba4595d1561c
This commit is contained in:
Denis Hsu 2020-01-18 09:40:23 +08:00 committed by Gerrit Code Review
commit 636a543a21
5 changed files with 0 additions and 55 deletions

View File

@ -537,7 +537,6 @@
/(system\/vendor|vendor)/bin/lbs_hidl_service u:object_r:lbs_hidl_service_exec:s0
/(system\/vendor|vendor)/bin/wmt_loader u:object_r:wmt_loader_exec:s0
/(system\/vendor|vendor)/bin/md_ctrl u:object_r:md_ctrl_exec:s0
/(system\/vendor|vendor)/bin/spm_loader u:object_r:spm_loader_exec:s0
/(system\/vendor|vendor)/bin/ccci_mdinit u:object_r:ccci_mdinit_exec:s0

View File

@ -1,30 +0,0 @@
# ==============================================
# Policy File of /system/bin/md_ctrl Executable File
# ==============================================
# Type Declaration
# ==============================================
type md_ctrl, domain;
type md_ctrl_exec, exec_type, file_type, vendor_file_type;
# ==============================================
# MTK Policy Rule
# ==============================================
# Date : WK14.46
# Operation : Migration
# Purpose : Start md_ctrl
init_daemon_domain(md_ctrl)
allow md_ctrl ccci_device:chr_file { rw_file_perms };
allow md_ctrl devpts:chr_file { rw_file_perms };
#allow md_ctrl self:capability dac_override;
allow md_ctrl muxreport_exec:file rx_file_perms;
allow md_ctrl emd_device:chr_file { rw_file_perms };
allow md_ctrl eemcs_device:chr_file { rw_file_perms };
# Needed to set vold.encryption.type
#set_prop(md_ctrl, vold_prop)
# Allow read to sys/kernel/ccci/* files
allow md_ctrl sysfs_ccci:dir search;
allow md_ctrl sysfs_ccci:file r_file_perms;

View File

@ -9,14 +9,6 @@
# Purpose : unmount /mnt/cd-rom. It causes by unmountAll() when VolumeManager starts
allow vold iso9660:filesystem unmount;
# Date : WK16.19
# Operation : Migration
# Purpose : dotrim for the mountpoints in fstab
typeattribute vold data_between_core_and_vendor_violators;
allow vold nvdata_file:dir r_dir_perms;
allow vold protect_f_data_file:dir r_dir_perms;
allow vold protect_s_data_file:dir r_dir_perms;
# Date : WK16.19
# Operation : Migration
# Purpose : vold will traverse /proc when remountUid().

View File

@ -1,8 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
# volume manager
#============= vold ==============
#allow vold debugfs_tracing:file write;

View File

@ -1,8 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
# volume manager
#============= vold ==============
#allow vold debugfs_tracing:file write;