Sepolicy: Comment out neverallow violations
To compile sdm710 target. Change-Id: I274b7ad2da86a39f6fe7295eb77570f1bdd87375
This commit is contained in:
parent
f9d5874dfd
commit
420b0f19fc
15 changed files with 20 additions and 20 deletions
2
legacy/vendor/common/clatd.te
vendored
2
legacy/vendor/common/clatd.te
vendored
|
@ -25,4 +25,4 @@
|
||||||
#OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
#OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||||
#IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
#IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
allow clatd clatd:packet_socket map;
|
#allow clatd clatd:packet_socket map;
|
||||||
|
|
2
legacy/vendor/common/dtseagleservice.te
vendored
2
legacy/vendor/common/dtseagleservice.te
vendored
|
@ -42,7 +42,7 @@ binder_call(dtseagleservice, system_app)
|
||||||
#binder_service(dtseagleservice)
|
#binder_service(dtseagleservice)
|
||||||
|
|
||||||
#Allow dtseagleservice to be registered with service manager
|
#Allow dtseagleservice to be registered with service manager
|
||||||
allow dtseagleservice dtseagleservice_service:service_manager add;
|
#allow dtseagleservice dtseagleservice_service:service_manager add;
|
||||||
|
|
||||||
#Allow access to audio drivers
|
#Allow access to audio drivers
|
||||||
allow dtseagleservice audio_device:dir r_dir_perms;
|
allow dtseagleservice audio_device:dir r_dir_perms;
|
||||||
|
|
2
legacy/vendor/common/fidodaemon.te
vendored
2
legacy/vendor/common/fidodaemon.te
vendored
|
@ -42,7 +42,7 @@ binder_call(fidodaemon, system_app)
|
||||||
#binder_service(fidodaemon)
|
#binder_service(fidodaemon)
|
||||||
|
|
||||||
#Allow fidodaemon to be registered with service manager
|
#Allow fidodaemon to be registered with service manager
|
||||||
allow fidodaemon fidodaemon_service:service_manager add;
|
#allow fidodaemon fidodaemon_service:service_manager add;
|
||||||
|
|
||||||
#Allow communication with init over property server
|
#Allow communication with init over property server
|
||||||
unix_socket_connect(fidodaemon, property, init);
|
unix_socket_connect(fidodaemon, property, init);
|
||||||
|
|
4
legacy/vendor/common/init_shell.te
vendored
4
legacy/vendor/common/init_shell.te
vendored
|
@ -87,7 +87,7 @@ set_prop(qti_init_shell, vendor_ipacm_prop)
|
||||||
set_prop(qti_init_shell, vendor_ipacm-diag_prop)
|
set_prop(qti_init_shell, vendor_ipacm-diag_prop)
|
||||||
set_prop(qti_init_shell, vendor_dataqti_prop)
|
set_prop(qti_init_shell, vendor_dataqti_prop)
|
||||||
set_prop(qti_init_shell, vendor_dataadpl_prop)
|
set_prop(qti_init_shell, vendor_dataadpl_prop)
|
||||||
set_prop(qti_init_shell, ctl_rildaemon_prop)
|
#set_prop(qti_init_shell, ctl_rildaemon_prop)
|
||||||
set_prop(qti_init_shell, ctl_qcrild_prop)
|
set_prop(qti_init_shell, ctl_qcrild_prop)
|
||||||
set_prop(qti_init_shell, ctl_vendor_rild_prop)
|
set_prop(qti_init_shell, ctl_vendor_rild_prop)
|
||||||
set_prop(qti_init_shell, ctl_vendor_qmuxd_prop)
|
set_prop(qti_init_shell, ctl_vendor_qmuxd_prop)
|
||||||
|
@ -104,7 +104,7 @@ set_prop(qti_init_shell, vendor_audio_prop)
|
||||||
set_prop(qti_init_shell, vendor_video_prop)
|
set_prop(qti_init_shell, vendor_video_prop)
|
||||||
userdebug_or_eng(`
|
userdebug_or_eng(`
|
||||||
# Needed for starting console in userdebug mode
|
# Needed for starting console in userdebug mode
|
||||||
set_prop(qti_init_shell, ctl_console_prop)
|
#set_prop(qti_init_shell, ctl_console_prop)
|
||||||
set_prop(qti_init_shell, vendor_coresight_prop)
|
set_prop(qti_init_shell, vendor_coresight_prop)
|
||||||
set_prop(qti_init_shell, vendor_audio_debug_prop)
|
set_prop(qti_init_shell, vendor_audio_debug_prop)
|
||||||
')
|
')
|
||||||
|
|
2
legacy/vendor/common/location_app.te
vendored
2
legacy/vendor/common/location_app.te
vendored
|
@ -55,4 +55,4 @@ allowxperm vendor_location_app self:socket ioctl msm_sock_ipc_ioctls;
|
||||||
allow vendor_location_app self:qipcrtr_socket create_socket_perms_no_ioctl;
|
allow vendor_location_app self:qipcrtr_socket create_socket_perms_no_ioctl;
|
||||||
allow vendor_location_app sysfs_data:file r_file_perms;
|
allow vendor_location_app sysfs_data:file r_file_perms;
|
||||||
unix_socket_connect(vendor_location_app, vendor_dpmtcm, vendor_dpmd)
|
unix_socket_connect(vendor_location_app, vendor_dpmtcm, vendor_dpmd)
|
||||||
allow location_app sysfs_kgsl_gpu_model:file r_file_perms;
|
#allow location_app sysfs_kgsl_gpu_model:file r_file_perms;
|
||||||
|
|
2
legacy/vendor/common/perfdump_app.te
vendored
2
legacy/vendor/common/perfdump_app.te
vendored
|
@ -56,7 +56,7 @@ allow perfdump_app mediaserver_service:service_manager find;
|
||||||
binder_call(perfdump_app, system_server)
|
binder_call(perfdump_app, system_server)
|
||||||
|
|
||||||
# dumpstate
|
# dumpstate
|
||||||
set_prop(perfdump_app, ctl_dumpstate_prop)
|
#set_prop(perfdump_app, ctl_dumpstate_prop)
|
||||||
unix_socket_connect(perfdump_app, dumpstate, dumpstate)
|
unix_socket_connect(perfdump_app, dumpstate, dumpstate)
|
||||||
|
|
||||||
dontaudit perfdump_app service_manager_type:service_manager *;
|
dontaudit perfdump_app service_manager_type:service_manager *;
|
||||||
|
|
2
legacy/vendor/common/qti_logkit_app.te
vendored
2
legacy/vendor/common/qti_logkit_app.te
vendored
|
@ -70,7 +70,7 @@ allow qti_logkit_app qti_logkit_pub_data_file:file create_file_perms;
|
||||||
allow qti_logkit_app wcnss_service_exec:file rx_file_perms;
|
allow qti_logkit_app wcnss_service_exec:file rx_file_perms;
|
||||||
|
|
||||||
# bugreport
|
# bugreport
|
||||||
allow qti_logkit_app ctl_dumpstate_prop:property_service set;
|
#allow qti_logkit_app ctl_dumpstate_prop:property_service set;
|
||||||
unix_socket_connect(qti_logkit_app, dumpstate, dumpstate)
|
unix_socket_connect(qti_logkit_app, dumpstate, dumpstate)
|
||||||
|
|
||||||
# ANR
|
# ANR
|
||||||
|
|
2
legacy/vendor/common/radio.te
vendored
2
legacy/vendor/common/radio.te
vendored
|
@ -28,7 +28,7 @@
|
||||||
# IMS needs permission to use avtimer
|
# IMS needs permission to use avtimer
|
||||||
allow radio avtimer_device:chr_file r_file_perms;
|
allow radio avtimer_device:chr_file r_file_perms;
|
||||||
|
|
||||||
allow radio { cameraserver_service mediaextractor_service mediacodec_service }:service_manager find;
|
#allow radio { cameraserver_service mediaextractor_service mediacodec_service }:service_manager find;
|
||||||
#diag
|
#diag
|
||||||
userdebug_or_eng(`
|
userdebug_or_eng(`
|
||||||
diag_use(radio)
|
diag_use(radio)
|
||||||
|
|
4
legacy/vendor/common/secotad.te
vendored
4
legacy/vendor/common/secotad.te
vendored
|
@ -42,10 +42,10 @@ binder_call(secotad, system_app)
|
||||||
#binder_service(secotad)
|
#binder_service(secotad)
|
||||||
|
|
||||||
#Allow secotad to be registered with service manager
|
#Allow secotad to be registered with service manager
|
||||||
allow secotad secotad_service:service_manager add;
|
#allow secotad secotad_service:service_manager add;
|
||||||
|
|
||||||
#Allow access to tee device
|
#Allow access to tee device
|
||||||
allow secotad tee_device:chr_file rw_file_perms;
|
allow secotad tee_device:chr_file rw_file_perms;
|
||||||
|
|
||||||
#Allow access to firmware
|
#Allow access to firmware
|
||||||
r_dir_file(secotad, firmware_file)
|
r_dir_file(secotad, firmware_file)
|
||||||
|
|
2
legacy/vendor/common/seemp_health_daemon.te
vendored
2
legacy/vendor/common/seemp_health_daemon.te
vendored
|
@ -42,7 +42,7 @@ binder_call(seemp_health_daemon, system_app)
|
||||||
#binder_service(seemp_health_daemon)
|
#binder_service(seemp_health_daemon)
|
||||||
|
|
||||||
#Allow seemp_health_daemon to be registered with service manager
|
#Allow seemp_health_daemon to be registered with service manager
|
||||||
allow seemp_health_daemon seemp_health_daemon_service:service_manager add;
|
#allow seemp_health_daemon seemp_health_daemon_service:service_manager add;
|
||||||
|
|
||||||
#Allow access to tee device
|
#Allow access to tee device
|
||||||
allow seemp_health_daemon tee_device:chr_file rw_file_perms;
|
allow seemp_health_daemon tee_device:chr_file rw_file_perms;
|
||||||
|
|
2
legacy/vendor/common/system_app.te
vendored
2
legacy/vendor/common/system_app.te
vendored
|
@ -109,7 +109,7 @@ allow system_app qti_logkit_priv_socket:dir r_dir_perms;
|
||||||
#allow system_app qti_logkit_priv_socket:sock_file r_file_perms;
|
#allow system_app qti_logkit_priv_socket:sock_file r_file_perms;
|
||||||
|
|
||||||
# bugreport
|
# bugreport
|
||||||
allow system_app ctl_dumpstate_prop:property_service set;
|
#allow system_app ctl_dumpstate_prop:property_service set;
|
||||||
unix_socket_connect(system_app, dumpstate, dumpstate)
|
unix_socket_connect(system_app, dumpstate, dumpstate)
|
||||||
|
|
||||||
# allow gba auth service to add itself as system service
|
# allow gba auth service to add itself as system service
|
||||||
|
|
2
legacy/vendor/test/fidotest.te
vendored
2
legacy/vendor/test/fidotest.te
vendored
|
@ -42,7 +42,7 @@ userdebug_or_eng(`
|
||||||
#binder_service(fidotest)
|
#binder_service(fidotest)
|
||||||
|
|
||||||
#Allow fido test daemons to be registered with service manager
|
#Allow fido test daemons to be registered with service manager
|
||||||
allow fidotest fidotest_service:service_manager add;
|
#allow fidotest fidotest_service:service_manager add;
|
||||||
|
|
||||||
# Allow communication with init over property server
|
# Allow communication with init over property server
|
||||||
unix_socket_connect(fidotest, property, init);
|
unix_socket_connect(fidotest, property, init);
|
||||||
|
|
2
legacy/vendor/test/qseeproxysample.te
vendored
2
legacy/vendor/test/qseeproxysample.te
vendored
|
@ -40,7 +40,7 @@ userdebug_or_eng(`
|
||||||
#binder_service(qseeproxysample)
|
#binder_service(qseeproxysample)
|
||||||
|
|
||||||
#Allow test daemon to be registered with service manager
|
#Allow test daemon to be registered with service manager
|
||||||
allow qseeproxysample qseeproxysample_service:service_manager add;
|
#allow qseeproxysample qseeproxysample_service:service_manager add;
|
||||||
|
|
||||||
#Allow test daemon to use system_server via binder to check caller identity
|
#Allow test daemon to use system_server via binder to check caller identity
|
||||||
binder_call(qseeproxysample, system_server)
|
binder_call(qseeproxysample, system_server)
|
||||||
|
|
8
legacy/vendor/test/seapp_contexts
vendored
8
legacy/vendor/test/seapp_contexts
vendored
|
@ -25,10 +25,10 @@
|
||||||
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||||
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
user=_app seinfo=platform name=com.qualcomm.qct.dlt levelfrom=all domain=location_app type=app_data_file
|
#user=_app seinfo=platform name=com.qualcomm.qct.dlt levelfrom=all domain=location_app type=app_data_file
|
||||||
user=_app seinfo=platform name=com.qualcomm.qti.qlogcat levelfrom=all domain=location_app type=app_data_file
|
#user=_app seinfo=platform name=com.qualcomm.qti.qlogcat levelfrom=all domain=location_app type=app_data_file
|
||||||
user=_app seinfo=platform name=com.qualcomm.qti.pdrtesttool levelfrom=all domain=location_app type=app_data_file
|
#user=_app seinfo=platform name=com.qualcomm.qti.pdrtesttool levelfrom=all domain=location_app type=app_data_file
|
||||||
user=_app seinfo=platform name=com.qualcomm.qti.magcaltool levelfrom=all domain=location_app type=app_data_file
|
#user=_app seinfo=platform name=com.qualcomm.qti.magcaltool levelfrom=all domain=location_app type=app_data_file
|
||||||
|
|
||||||
#Add new domain for QSEE sample services
|
#Add new domain for QSEE sample services
|
||||||
user=system seinfo=platform name=com.qualcomm.qti.auth.securesampleauthservice domain=qsee_svc_app type=system_app_data_file
|
user=system seinfo=platform name=com.qualcomm.qti.auth.securesampleauthservice domain=qsee_svc_app type=system_app_data_file
|
||||||
|
|
2
legacy/vendor/test/ustaservice_app.te
vendored
2
legacy/vendor/test/ustaservice_app.te
vendored
|
@ -27,7 +27,7 @@
|
||||||
type ustaservice_app, domain;
|
type ustaservice_app, domain;
|
||||||
app_domain(ustaservice_app)
|
app_domain(ustaservice_app)
|
||||||
|
|
||||||
allow ustaservice_app vendor_usta_app_service:service_manager add;
|
#allow ustaservice_app vendor_usta_app_service:service_manager add;
|
||||||
allow ustaservice_app vendor_usta_app_service:service_manager find;
|
allow ustaservice_app vendor_usta_app_service:service_manager find;
|
||||||
allow ustaservice_app activity_service:service_manager find;
|
allow ustaservice_app activity_service:service_manager find;
|
||||||
allow ustaservice_app app_api_service:service_manager find;
|
allow ustaservice_app app_api_service:service_manager find;
|
||||||
|
|
Loading…
Reference in a new issue