[ALPS03878175] Remove system_writes_vendor_properties_violators

system_writes_vendor_properties_violators is only workaround,
and will cause *TS test fail, so remove the workaround and
corresponding rules that cause build fail.

MTK-Commit-Id: f637c1416b591c821bc9c18fd3dbf3aa5f9038af

Change-Id: If09922120de0742ec47d7c0522168d4e78a4e74f
CR-Id: ALPS03878175
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
This commit is contained in:
Lili Lin 2020-01-18 10:04:31 +08:00
parent b2561b02e2
commit 9e64f5e935
7 changed files with 0 additions and 37 deletions

View File

@ -340,13 +340,6 @@ allow cameraserver debugfs_ion:dir search;
# Purpose: Allow to access cmdq driver
# allow cameraserver mtk_cmdq_device:chr_file { read ioctl open };
# Date : WK17.28
# Operation : MT6757 SQC
# Purpose : Change thermal config
# typeattribute cameraserver system_writes_vendor_properties_violators;
# allow cameraserver mtk_thermal_config_prop:file { getattr open read };
# Date : WK17.44
# Operation : Migration
# Purpose : DIP Driver

View File

@ -3,7 +3,6 @@
# ==============================================
# Purpose: aee_dumpstate set surfaceflinger property
typeattribute dumpstate system_writes_vendor_properties_violators;
set_prop(dumpstate, debug_bq_dump_prop);
# Purpose: access dev/aed0

View File

@ -7,10 +7,3 @@
allow mediadrmserver proc_ged:file {open read write ioctl getattr};
# Date : WK17.28
# Operation : MT6757 SQC
# Purpose : Change thermal config
allow mediaserver mtk_thermal_config_prop:file { getattr open read };
allow mediaserver mtk_thermal_config_prop:property_service set;

View File

@ -295,13 +295,6 @@ allow mediaserver camera_owe_device:chr_file rw_file_perms;
# Purpose: Allow to access cmdq driver
allow mediaserver mtk_cmdq_device:chr_file { read ioctl open };
# Date : WK17.12
# Operation : MT6799 SQC
# Purpose : Change thermal config
typeattribute mediaserver system_writes_vendor_properties_violators;
allow mediaserver mtk_thermal_config_prop:file { getattr open read };
# Date : WK17.43
# Operation : Migration
# Purpose : DISP access

View File

@ -11,8 +11,6 @@ allow radio sysfs_keypad_file:file { w_file_perms };
# Purpose : for engineermode WFD IOT property
allow radio surfaceflinger:fifo_file { rw_file_perms };
typeattribute radio system_writes_vendor_properties_violators;
# Date : 2016/06/11
# Operation : IT
# Purpose : for engineermode Usb PHY Tuning
@ -145,10 +143,6 @@ get_prop(radio, wmt_prop)
# Purpose: Allow radio to get tel_switch_prop
get_prop(radio, tel_switch_prop)
#Date: W1817
#Purpose: allow rild access property of vendor_radio_prop
set_prop(radio, vendor_radio_prop)
# Date : 2018/05/03
# Operation: P migration
# Purpose: allow EM to set modem reset delay property
@ -178,7 +172,6 @@ allow radio sysfs_spm:dir { search };
# Date : 2018/06/15
# Purpose : Allow EM access AAL settings
set_prop(radio, mtk_aal_prop)
get_prop(radio, mtk_aal_prop)
# Date : 2018/06/15

View File

@ -13,7 +13,6 @@ hal_client_domain(system_app, mtk_hal_lbs)
#Dat: 2017/02/14
#Purpose: allow set telephony Sensitive property
typeattribute system_app system_writes_vendor_properties_violators;
get_prop(system_app, mtk_telephony_sensitive_prop)

View File

@ -80,13 +80,6 @@ allow system_server ttyS_device:chr_file rw_file_perms;
allow system_server proc_mtktz:dir search;
allow system_server proc_mtktz:file r_file_perms;
# Date : WK16.46
# Operation: PowerManager set persist.meta.connecttype property
# Purpose: Reboot target to meta mode,
# and set persist.meta.connecttype as "wifi" or "usb".
typeattribute system_server system_writes_vendor_properties_violators;
allow system_server meta_connecttype_prop:property_service set;
# Date:W17.02
# Operation : audio hal developing
# Purpose : audio hal interface permission