[ALPS03800946] Remove data_between_core_and_vendor_violators
[Detail] data_between_core_and_vendor_violators is used temporarily. We should follow Android P SELinux rule to write sepolicy. [Solution] Remove data_between_core_and_vendor_violators from files which already fix SELinux build errors MTK-Commit-Id: 6a75842a96d8997bca10caf6ca4d5b4e7e8f68a4 Change-Id: I5e840fdf6b61d44860429a7e5c7e24c9a48a9c75 CR-Id: ALPS03800946 Feature: Treble
This commit is contained in:
parent
2b5347b5dc
commit
700750af5e
@ -74,7 +74,6 @@ allow factory vendor_factory_idle_state_prop:property_service set;
|
||||
|
||||
# Date: WK15.46
|
||||
# Purpose: gps factory mode
|
||||
####typeattribute factory data_between_core_and_vendor_violators;
|
||||
###allow factory agpsd_data_file:dir search;
|
||||
allow factory apk_data_file:dir write;
|
||||
#allow factory gps_data_file:dir r_dir_perms;
|
||||
|
@ -53,7 +53,6 @@ allow fuelgauged self:netlink_route_socket { bind create getattr write nlmsg_rea
|
||||
# Purpose : For fg daemon can access /data/FG folder
|
||||
#file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
|
||||
#allow fuelgauged fuelgauged_file:file rw_file_perms;
|
||||
#typeattribute fuelgauged data_between_core_and_vendor_violators;
|
||||
#allow fuelgauged system_data_file:dir rw_dir_perms;
|
||||
|
||||
# Data : WK16.21
|
||||
|
@ -27,7 +27,6 @@ init_daemon_domain(fuelgauged_nvram)
|
||||
# Purpose : For fg daemon can access /data/FG folder
|
||||
#file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
|
||||
#allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
|
||||
#typeattribute fuelgauged_nvram data_between_core_and_vendor_violators;
|
||||
#allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
|
||||
|
||||
# Data : WK16.21
|
||||
|
@ -40,7 +40,6 @@ allow nvram_agent_binder init:unix_stream_socket connectto;
|
||||
allow nvram_agent_binder property_socket:sock_file write;
|
||||
allow nvram_agent_binder sysfs:file write;
|
||||
#allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
|
||||
#typeattribute nvram_agent_binder data_between_core_and_vendor_violators;
|
||||
#remove from Android P
|
||||
#allow nvram_agent_binder system_data_file:dir create_file_perms;
|
||||
|
||||
@ -71,4 +70,4 @@ hal_server_domain(nvram_agent_binder, hal_nvramagent)
|
||||
# Date : WK18.16
|
||||
# Operation: P migration
|
||||
# Purpose: Allow nvram_daemon to get tel_switch_prop
|
||||
get_prop(nvram_daemon, tel_switch_prop)
|
||||
get_prop(nvram_daemon, tel_switch_prop)
|
||||
|
@ -70,7 +70,6 @@ allow nvram_daemon proc_lk_env:file rw_file_perms;
|
||||
|
||||
# Purpose: for workaround
|
||||
# Todo: Remove this policy
|
||||
#typeattribute nvram_daemon data_between_core_and_vendor_violators;
|
||||
#remove from Android P
|
||||
#allow nvram_daemon system_data_file:dir write;
|
||||
|
||||
@ -105,4 +104,4 @@ allow nvram_daemon sysfs:file read;
|
||||
# Date : WK18.16
|
||||
# Operation: P migration
|
||||
# Purpose: Allow nvram_daemon to get tel_switch_prop
|
||||
get_prop(nvram_daemon, tel_switch_prop)
|
||||
get_prop(nvram_daemon, tel_switch_prop)
|
||||
|
@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
|
||||
init_daemon_domain(kisd)
|
||||
|
||||
allow kisd tee_device:chr_file {read write open ioctl};
|
||||
#typeattribute kisd data_between_core_and_vendor_violators;
|
||||
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
||||
allow kisd provision_file:file {create read write open getattr unlink};
|
||||
allow kisd system_file:file {execute_no_trans};
|
||||
|
@ -16,7 +16,6 @@ typeattribute kisd mlstrustedsubject;
|
||||
init_daemon_domain(kisd)
|
||||
|
||||
allow kisd tee_device:chr_file {read write open ioctl};
|
||||
typeattribute kisd data_between_core_and_vendor_violators;
|
||||
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
|
||||
allow kisd provision_file:file {create read write open getattr unlink};
|
||||
allow kisd system_file:file {execute_no_trans};
|
||||
|
Loading…
x
Reference in New Issue
Block a user