comment out sepolicy neverallow violations to get kona building
Change-Id: I6ea860a26ee95ae825ec35acd448880ad9d744ea
This commit is contained in:
parent
7b5419b36e
commit
0c15e18c6f
5 changed files with 9 additions and 5 deletions
3
generic/vendor/test/fidotest.te
vendored
3
generic/vendor/test/fidotest.te
vendored
|
@ -37,7 +37,8 @@ userdebug_or_eng(`
|
|||
binder_call(system_app, fidotest)
|
||||
|
||||
#Allow fido test daemons to be registered with service manager
|
||||
allow fidotest fidotest_service:service_manager add;
|
||||
#TODO(b/142498985): Review sepolicy neverallow violation
|
||||
#allow fidotest fidotest_service:service_manager add;
|
||||
|
||||
# Allow communication with init over property server
|
||||
unix_socket_connect(fidotest, property, init);
|
||||
|
|
3
generic/vendor/test/qseeproxysample.te
vendored
3
generic/vendor/test/qseeproxysample.te
vendored
|
@ -31,7 +31,8 @@ init_daemon_domain(qseeproxysample)
|
|||
userdebug_or_eng(`
|
||||
|
||||
#Allow test daemon to be registered with service manager
|
||||
allow qseeproxysample qseeproxysample_service:service_manager add;
|
||||
#TODO(b/142498985): Review sepolicy neverallow violation
|
||||
#allow qseeproxysample qseeproxysample_service:service_manager add;
|
||||
|
||||
#Allow test daemon to use system_server via binder to check caller identity
|
||||
binder_call(qseeproxysample, system_server)
|
||||
|
|
3
generic/vendor/test/ustaservice_app.te
vendored
3
generic/vendor/test/ustaservice_app.te
vendored
|
@ -27,7 +27,8 @@
|
|||
type ustaservice_app, domain;
|
||||
app_domain(ustaservice_app)
|
||||
|
||||
allow ustaservice_app usta_app_service:service_manager add;
|
||||
#TODO(b/142498985): Review sepolicy neverallow violation
|
||||
#allow ustaservice_app usta_app_service:service_manager add;
|
||||
allow ustaservice_app usta_app_service:service_manager find;
|
||||
allow ustaservice_app activity_service:service_manager find;
|
||||
|
||||
|
|
3
qva/vendor/common/perfdump_app.te
vendored
3
qva/vendor/common/perfdump_app.te
vendored
|
@ -57,7 +57,8 @@ allow perfdump_app mediaserver_service:service_manager find;
|
|||
binder_call(perfdump_app, system_server)
|
||||
|
||||
# dumpstate
|
||||
set_prop(perfdump_app, ctl_dumpstate_prop)
|
||||
# TODO(b/142498985): review sepolicy neverallow violation
|
||||
#set_prop(perfdump_app, ctl_dumpstate_prop)
|
||||
unix_socket_connect(perfdump_app, dumpstate, dumpstate)
|
||||
|
||||
dontaudit perfdump_app service_manager_type:service_manager *;
|
||||
|
|
2
qva/vendor/common/vendor_init.te
vendored
2
qva/vendor/common/vendor_init.te
vendored
|
@ -28,7 +28,7 @@
|
|||
type vendor_init_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
set_prop(vendor_init, vendor_bluetooth_prop)
|
||||
set_prop(vendor_init, vold_prop)
|
||||
#set_prop(vendor_init, vold_prop)
|
||||
|
||||
set_prop(vendor_init, vendor_hvdcp_opti_prop)
|
||||
get_prop(vendor_init, vendor_hvdcp_opti_prop)
|
||||
|
|
Loading…
Reference in a new issue