[ALPS04723438] SEPolicy: Remove unused sepolicies of vendor_app

Remove unused sepolicies of vendor_app.

MTK-Commit-Id: 54bf7fcfcdbc902f7ab59247a5d29c04b20ffbee

Change-Id: I9018da7029b4bff0468237142108624262fa64b9
CR-Id: ALPS04723438
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
This commit is contained in:
Shanshan Guo 2020-01-18 10:18:18 +08:00 committed by Shanshan Guo
parent a380459549
commit e045492863
2 changed files with 0 additions and 93 deletions

View File

@ -1,12 +0,0 @@
# Add for app stay in vendor partition and want to IPC with vendor process
#
#
# This is for mtklogger apk to commnucate with mnld
user=_app seinfo=platform name=com.mediatek.mtklogger.proxy domain=vendor_app type=app_data_file levelFrom=user
# This is for emcamera apk to commnucate with hal1
user=_app seinfo=platform name=com.mediatek.emcamera domain=vendor_app type=app_data_file levelFrom=user
# This is for sensorhub apk to commnucate with libhwm
user=_app seinfo=platform name=com.mediatek.sensorhub.ui domain=vendor_app type=app_data_file levelFrom=user

View File

@ -1,81 +0,0 @@
##############################
# vendor app domain
#
# This is for common part
type vendor_app, domain, mlstrustedsubject;
app_domain(vendor_app)
allow vendor_app mnt_media_rw_file:dir search;
# allow cts to query all services
allow vendor_app servicemanager:service_manager list;
allow vendor_app audioserver_service:service_manager find;
allow vendor_app cameraserver_service:service_manager find;
allow vendor_app drmserver_service:service_manager find;
allow vendor_app mediaserver_service:service_manager find;
allow vendor_app mediaextractor_service:service_manager find;
allow vendor_app mediametrics_service:service_manager find;
allow vendor_app mediadrmserver_service:service_manager find;
allow vendor_app nfc_service:service_manager find;
allow vendor_app radio_service:service_manager find;
allow vendor_app surfaceflinger_service:service_manager find;
allow vendor_app app_api_service:service_manager find;
allow vendor_app vr_manager_service:service_manager find;
# Cts: HwRngTest
allow vendor_app sysfs_hwrandom:dir search;
allow vendor_app sysfs_hwrandom:file r_file_perms;
# Allow apps to view preloaded media content
allow vendor_app preloads_media_file:dir r_dir_perms;
allow vendor_app preloads_media_file:file r_file_perms;
allow vendor_app preloads_data_file:dir search;
# Allow untrusted apps read / execute access to /vendor/app for there can
# be pre-installed vendor apps that package a library within themselves.
# TODO (b/37784178) Consider creating a special type for /vendor/app installed
# apps.
allow vendor_app vendor_app_file:dir { open getattr read search };
allow vendor_app vendor_app_file:file { open getattr read execute };
allow vendor_app vendor_app_file:lnk_file { open getattr read };
#End for common part
# For mtkloggerproxy
unix_socket_connect(vendor_app, mnld, mnld);
#============= vendor_app ==============
allow vendor_app mnld:unix_stream_socket connectto;
allow vendor_app connsyslogger:unix_stream_socket connectto;
# PMTKLoggerProxy need copy exception db from data/vendor folder
allow vendor_app aee_exp_data_file:file r_file_perms;
allow vendor_app aee_exp_data_file:dir r_dir_perms;
# Date : WK18.26
# Operation : P migration
# Purpose : for engineermode camera app mode
set_prop(vendor_app, mtk_em_prop);
set_prop(vendor_app, vendor_debug_prop);
set_prop(vendor_app, mediatek_prop);
allow vendor_app cameraserver_service:service_manager find;
# Date : WK18.26
# Purpose :
# eng mode camera - save iamges files and log files on external storage
allow vendor_app media_rw_data_file:dir { create_dir_perms };
allow vendor_app media_rw_data_file:file { create_file_perms };
# Date : WK18.32
# Purpose :
# eng mode camera - save iamges files and log files on external storage
allow vendor_app vendor_data_file:dir { create_dir_perms };
allow vendor_app vendor_data_file:file { create_file_perms };
# Date : 2019/03/25
# Operation : IT
# Purpose : for engineermode sensor can work normal
allow vendor_app als_ps_device:chr_file r_file_perms;
allow vendor_app gsensor_device:chr_file r_file_perms;
allow vendor_app gyroscope_device:chr_file r_file_perms;