Use set_prop() macro for property sets
Change-Id: Id67a05f8ed718cad5856613c2700f4ce1e404cf0
This commit is contained in:
parent
e7b12756b8
commit
bac2436661
14 changed files with 9 additions and 29 deletions
3
legacy/vendor/common/fidodaemon.te
vendored
3
legacy/vendor/common/fidodaemon.te
vendored
|
@ -44,9 +44,6 @@ binder_call(fidodaemon, system_app)
|
|||
#Allow fidodaemon to be registered with service manager
|
||||
#allow fidodaemon fidodaemon_service:service_manager add;
|
||||
|
||||
#Allow communication with init over property server
|
||||
unix_socket_connect(fidodaemon, property, init);
|
||||
|
||||
#Allow access to tee device
|
||||
allow fidodaemon tee_device:chr_file rw_file_perms;
|
||||
|
||||
|
|
2
legacy/vendor/common/qseecomd.te
vendored
2
legacy/vendor/common/qseecomd.te
vendored
|
@ -87,8 +87,6 @@ allow tee sysfs_securetouch:file rw_file_perms;
|
|||
binder_call(tee, surfaceflinger)
|
||||
#binder_use(tee)
|
||||
|
||||
#allow tee system_app:unix_dgram_socket sendto;
|
||||
unix_socket_connect(tee, property, init)
|
||||
|
||||
userdebug_or_eng(`
|
||||
allow tee su:unix_dgram_socket sendto;
|
||||
|
|
3
legacy/vendor/common/qseeproxy.te
vendored
3
legacy/vendor/common/qseeproxy.te
vendored
|
@ -43,9 +43,6 @@ allow qseeproxy qseeproxy_service:service_manager add;
|
|||
#Allow qseeproxy to use system_server via binder to check caller identity
|
||||
binder_call(qseeproxy, system_server)
|
||||
|
||||
#Allow communication with init over property server
|
||||
unix_socket_connect(qseeproxy, property, init);
|
||||
|
||||
#Allow access to tee device
|
||||
allow qseeproxy tee_device:chr_file rw_file_perms;
|
||||
|
||||
|
|
2
legacy/vendor/common/qti_logkit_app.te
vendored
2
legacy/vendor/common/qti_logkit_app.te
vendored
|
@ -70,7 +70,7 @@ allow qti_logkit_app qti_logkit_pub_data_file:file create_file_perms;
|
|||
allow qti_logkit_app wcnss_service_exec:file rx_file_perms;
|
||||
|
||||
# bugreport
|
||||
#allow qti_logkit_app ctl_dumpstate_prop:property_service set;
|
||||
#set_prop(qti_logkit_app, ctl_dumpstate_prop)
|
||||
unix_socket_connect(qti_logkit_app, dumpstate, dumpstate)
|
||||
|
||||
# ANR
|
||||
|
|
2
legacy/vendor/common/system_app.te
vendored
2
legacy/vendor/common/system_app.te
vendored
|
@ -109,7 +109,7 @@ allow system_app qti_logkit_priv_socket:dir r_dir_perms;
|
|||
#allow system_app qti_logkit_priv_socket:sock_file r_file_perms;
|
||||
|
||||
# bugreport
|
||||
#allow system_app ctl_dumpstate_prop:property_service set;
|
||||
#set_prop(system_app, ctl_dumpstate_prop)
|
||||
unix_socket_connect(system_app, dumpstate, dumpstate)
|
||||
|
||||
# allow gba auth service to add itself as system service
|
||||
|
|
2
legacy/vendor/common/system_server.te
vendored
2
legacy/vendor/common/system_server.te
vendored
|
@ -110,7 +110,7 @@ binder_call(system_server, fps_hal)
|
|||
allow system_server iqfp_service:service_manager find;
|
||||
|
||||
# For shutdown animation
|
||||
allow system_server ctl_bootanim_prop:property_service set;
|
||||
set_prop(system_server, ctl_bootanim_prop)
|
||||
|
||||
# allow tethering to access dhcp leases
|
||||
r_dir_file(system_server, dhcp_data_file)
|
||||
|
|
1
legacy/vendor/common/wifi_ftmd.te
vendored
1
legacy/vendor/common/wifi_ftmd.te
vendored
|
@ -33,4 +33,3 @@ net_domain(wifi_ftmd)
|
|||
|
||||
set_prop(wifi_ftmd,vendor_wifi_ftmd_prop);
|
||||
allow wifi_ftmd self:capability net_admin;
|
||||
allow wifi_ftmd vendor_wifi_ftmd_prop:property_service set;
|
||||
|
|
2
legacy/vendor/common/zygote.te
vendored
2
legacy/vendor/common/zygote.te
vendored
|
@ -25,7 +25,7 @@
|
|||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
allow zygote system_prop:property_service set;
|
||||
set_prop(zygote, system_prop)
|
||||
get_prop(zygote, vendor_mpctl_prop)
|
||||
get_prop(zygote, vendor_video_prop)
|
||||
allow zygote self:capability kill;
|
||||
|
|
5
legacy/vendor/msm8953/init_shell.te
vendored
5
legacy/vendor/msm8953/init_shell.te
vendored
|
@ -25,9 +25,8 @@
|
|||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
allow qti_init_shell {
|
||||
vendor_media_msm8953_version_prop
|
||||
}:property_service set;
|
||||
# media_msm8953_version_prop - to choose target version specific media_codecs.xml
|
||||
set_prop(qti_init_shell, vendor_media_msm8953_version_prop)
|
||||
|
||||
# For regionalization
|
||||
allow qti_init_shell regionalization_file:dir r_dir_perms;
|
||||
|
|
4
legacy/vendor/sdm660/init_shell.te
vendored
4
legacy/vendor/sdm660/init_shell.te
vendored
|
@ -32,5 +32,5 @@ allow qti_init_shell regionalization_file:file create_file_perms;
|
|||
#Needed for starting cdsprpcd service post-boot
|
||||
set_prop(qti_init_shell, vendor_cdsprpcd_prop)
|
||||
#Needed for ctl property denials
|
||||
allow qti_init_shell ctl_start_prop:property_service set;
|
||||
allow qti_init_shell ctl_stop_prop:property_service set;
|
||||
set_prop(qti_init_shell, ctl_start_prop)
|
||||
set_prop(qti_init_shell, ctl_stop_prop)
|
||||
|
|
3
legacy/vendor/sdm660/vendor_init.te
vendored
3
legacy/vendor/sdm660/vendor_init.te
vendored
|
@ -25,6 +25,5 @@
|
|||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
allow vendor_init vendor_freq_prop:property_service set;
|
||||
|
||||
set_prop(vendor_init, vendor_freq_prop)
|
||||
set_prop(vendor_init, vendor_video_prop);
|
||||
|
|
3
legacy/vendor/test/fidotest.te
vendored
3
legacy/vendor/test/fidotest.te
vendored
|
@ -44,9 +44,6 @@ userdebug_or_eng(`
|
|||
#Allow fido test daemons to be registered with service manager
|
||||
#allow fidotest fidotest_service:service_manager add;
|
||||
|
||||
# Allow communication with init over property server
|
||||
unix_socket_connect(fidotest, property, init);
|
||||
|
||||
# Allow access to tee device
|
||||
allow fidotest tee_device:chr_file rw_file_perms;
|
||||
|
||||
|
|
3
legacy/vendor/test/qseeproxysample.te
vendored
3
legacy/vendor/test/qseeproxysample.te
vendored
|
@ -45,9 +45,6 @@ userdebug_or_eng(`
|
|||
#Allow test daemon to use system_server via binder to check caller identity
|
||||
binder_call(qseeproxysample, system_server)
|
||||
|
||||
# Allow communication with init over property server
|
||||
unix_socket_connect(qseeproxysample, property, init);
|
||||
|
||||
# Allow access to tee device
|
||||
allow qseeproxysample tee_device:chr_file rw_file_perms;
|
||||
|
||||
|
|
|
@ -68,9 +68,6 @@ allow wfdservice graphics_device:chr_file rw_file_perms;
|
|||
#Allow access to encoder for YUV statistics
|
||||
allow wfdservice gpu_device:chr_file rw_file_perms;
|
||||
|
||||
#Allow communication with init over property server
|
||||
unix_socket_connect(wfdservice, property, init);
|
||||
|
||||
#Allow access to /dev/video/* devices for encoding/decoding
|
||||
allow wfdservice video_device:chr_file rw_file_perms;
|
||||
allow wfdservice video_device:dir r_dir_perms;
|
||||
|
|
Loading…
Reference in a new issue