[ALPS03891225] Modify vold related policy

[Detail]
1. remove md_ctrl.te because we dont use md_ctrl in P.
2. remove debugfs_tracing policy
3. remove nvdata, protect_f, protect_s policy

MTK-Commit-Id: d4e5c9893970f0b214b518cba5f9300f130eace9

Change-Id: Iaafc30124fd69ef2b989b9e4e51d71a37d9571e9
CR-Id: ALPS03891225
Feature: Multi-Storage
This commit is contained in:
Denis Hsu 2020-01-18 09:40:17 +08:00
parent 2f7073ef01
commit 977ad3f552
5 changed files with 0 additions and 55 deletions

View File

@ -537,7 +537,6 @@
/(system\/vendor|vendor)/bin/lbs_hidl_service u:object_r:lbs_hidl_service_exec:s0 /(system\/vendor|vendor)/bin/lbs_hidl_service u:object_r:lbs_hidl_service_exec:s0
/(system\/vendor|vendor)/bin/wmt_loader u:object_r:wmt_loader_exec:s0 /(system\/vendor|vendor)/bin/wmt_loader u:object_r:wmt_loader_exec:s0
/(system\/vendor|vendor)/bin/md_ctrl u:object_r:md_ctrl_exec:s0
/(system\/vendor|vendor)/bin/spm_loader u:object_r:spm_loader_exec:s0 /(system\/vendor|vendor)/bin/spm_loader u:object_r:spm_loader_exec:s0
/(system\/vendor|vendor)/bin/ccci_mdinit u:object_r:ccci_mdinit_exec:s0 /(system\/vendor|vendor)/bin/ccci_mdinit u:object_r:ccci_mdinit_exec:s0

View File

@ -1,30 +0,0 @@
# ==============================================
# Policy File of /system/bin/md_ctrl Executable File
# ==============================================
# Type Declaration
# ==============================================
type md_ctrl, domain;
type md_ctrl_exec, exec_type, file_type, vendor_file_type;
# ==============================================
# MTK Policy Rule
# ==============================================
# Date : WK14.46
# Operation : Migration
# Purpose : Start md_ctrl
init_daemon_domain(md_ctrl)
allow md_ctrl ccci_device:chr_file { rw_file_perms };
allow md_ctrl devpts:chr_file { rw_file_perms };
#allow md_ctrl self:capability dac_override;
allow md_ctrl muxreport_exec:file rx_file_perms;
allow md_ctrl emd_device:chr_file { rw_file_perms };
allow md_ctrl eemcs_device:chr_file { rw_file_perms };
# Needed to set vold.encryption.type
#set_prop(md_ctrl, vold_prop)
# Allow read to sys/kernel/ccci/* files
allow md_ctrl sysfs_ccci:dir search;
allow md_ctrl sysfs_ccci:file r_file_perms;

View File

@ -9,14 +9,6 @@
# Purpose : unmount /mnt/cd-rom. It causes by unmountAll() when VolumeManager starts # Purpose : unmount /mnt/cd-rom. It causes by unmountAll() when VolumeManager starts
allow vold iso9660:filesystem unmount; allow vold iso9660:filesystem unmount;
# Date : WK16.19
# Operation : Migration
# Purpose : dotrim for the mountpoints in fstab
typeattribute vold data_between_core_and_vendor_violators;
allow vold nvdata_file:dir r_dir_perms;
allow vold protect_f_data_file:dir r_dir_perms;
allow vold protect_s_data_file:dir r_dir_perms;
# Date : WK16.19 # Date : WK16.19
# Operation : Migration # Operation : Migration
# Purpose : vold will traverse /proc when remountUid(). # Purpose : vold will traverse /proc when remountUid().

View File

@ -1,8 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
# volume manager
#============= vold ==============
#allow vold debugfs_tracing:file write;

View File

@ -1,8 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
# volume manager
#============= vold ==============
#allow vold debugfs_tracing:file write;