sdm660-common: sepolicy: cleaning (duplicate permissions, move file from subdir)
This commit is contained in:
parent
68c470f248
commit
a8a14b55c8
7 changed files with 1 additions and 10 deletions
1
sepolicy/vendor/dataservice_app.te
vendored
1
sepolicy/vendor/dataservice_app.te
vendored
|
@ -1,2 +1 @@
|
||||||
allow vendor_dataservice_app system_data_file:dir r_dir_perms;
|
allow vendor_dataservice_app system_data_file:dir r_dir_perms;
|
||||||
allow vendor_dataservice_app system_data_file:dir search;
|
|
||||||
|
|
1
sepolicy/vendor/hal_light_default.te
vendored
1
sepolicy/vendor/hal_light_default.te
vendored
|
@ -1,2 +1 @@
|
||||||
allow hal_light_default sysfs:file rw_file_perms;
|
allow hal_light_default sysfs:file rw_file_perms;
|
||||||
allow hal_light_default sysfs:file { open read write };
|
|
||||||
|
|
1
sepolicy/vendor/hal_power_default.te
vendored
1
sepolicy/vendor/hal_power_default.te
vendored
|
@ -1,4 +1,3 @@
|
||||||
allow hal_power_default cgroup:file read;
|
|
||||||
allow hal_power_default cgroup:file rw_file_perms;
|
allow hal_power_default cgroup:file rw_file_perms;
|
||||||
allow hal_power_default latency_device:chr_file rw_file_perms;
|
allow hal_power_default latency_device:chr_file rw_file_perms;
|
||||||
allow hal_power_default sysfs_battery_saver:dir r_dir_perms;
|
allow hal_power_default sysfs_battery_saver:dir r_dir_perms;
|
||||||
|
|
4
sepolicy/vendor/init.te
vendored
4
sepolicy/vendor/init.te
vendored
|
@ -9,10 +9,6 @@ allow init sysfs_battery_supply:file setattr;
|
||||||
allow init vendor_default_prop:property_service set;
|
allow init vendor_default_prop:property_service set;
|
||||||
allow init sysfs_info:file { open read };
|
allow init sysfs_info:file { open read };
|
||||||
|
|
||||||
allow init {
|
|
||||||
bt_firmware_file
|
|
||||||
firmware_file
|
|
||||||
}:filesystem getattr;
|
|
||||||
allow init firmware_file:filesystem { getattr };
|
allow init firmware_file:filesystem { getattr };
|
||||||
allow init bt_firmware_file:filesystem { getattr };
|
allow init bt_firmware_file:filesystem { getattr };
|
||||||
allow init apex_metadata_file:lnk_file { read };
|
allow init apex_metadata_file:lnk_file { read };
|
||||||
|
|
1
sepolicy/vendor/system_app.te
vendored
1
sepolicy/vendor/system_app.te
vendored
|
@ -1,6 +1,5 @@
|
||||||
allow system_app blkio_dev:dir search;
|
allow system_app blkio_dev:dir search;
|
||||||
allow system_app hall_dev:file rw_file_perms;
|
allow system_app hall_dev:file rw_file_perms;
|
||||||
allow system_app hall_dev:dir search;
|
|
||||||
allow system_app kcal_dev:dir search;
|
allow system_app kcal_dev:dir search;
|
||||||
allow system_app kcal_dev:file rw_file_perms;
|
allow system_app kcal_dev:file rw_file_perms;
|
||||||
allow system_app proc_pagetypeinfo:file r_file_perms;
|
allow system_app proc_pagetypeinfo:file r_file_perms;
|
||||||
|
|
1
sepolicy/vendor/vold.te
vendored
1
sepolicy/vendor/vold.te
vendored
|
@ -1,4 +1,3 @@
|
||||||
allow vold sysfs_mmc_host:file write;
|
|
||||||
allow vold sysfs_mmc_host:file create_file_perms;
|
allow vold sysfs_mmc_host:file create_file_perms;
|
||||||
allow vold vendor_apex_file:file { getattr };
|
allow vold vendor_apex_file:file { getattr };
|
||||||
allow vold mnt_vendor_file:dir { ioctl open read };
|
allow vold mnt_vendor_file:dir { ioctl open read };
|
||||||
|
|
Loading…
Reference in a new issue