Relax some neverallow rules

am: bd3e300a13

Change-Id: I8e353fd200af7874f93a86134a81e05cd32cd289
This commit is contained in:
Nick Kralevich 2018-08-08 11:00:43 -07:00 committed by android-build-merger
commit d79567cad5

View file

@ -819,7 +819,7 @@ full_treble_only(`
} {
data_file_type
-core_data_file_type
}:file_class_set ~{ append getattr ioctl read write };
}:file_class_set ~{ append getattr ioctl read write map };
')
full_treble_only(`
neverallow {
@ -851,7 +851,7 @@ full_treble_only(`
# files in /data/misc/zoneinfo/tzdata file. These functions are considered
# vndk-stable and thus must be allowed for all processes.
-zoneinfo_data_file
}:file_class_set ~{ append getattr ioctl read write };
}:file_class_set ~{ append getattr ioctl read write map };
neverallow {
vendor_init
-data_between_core_and_vendor_violators
@ -859,7 +859,7 @@ full_treble_only(`
core_data_file_type
-unencrypted_data_file
-zoneinfo_data_file
}:file_class_set ~{ append getattr ioctl read write };
}:file_class_set ~{ append getattr ioctl read write map };
# vendor init needs to be able to read unencrypted_data_file to create directories with FBE.
# The vendor init binary lives on the system partition so there is not a concern with stability.
neverallow vendor_init unencrypted_data_file:file ~r_file_perms;
@ -925,7 +925,7 @@ full_treble_only(`
-init
} {
vendor_data_file # default label for files on /data/vendor{,_ce,_de}.
}:file_class_set ~{ append getattr ioctl read write };
}:file_class_set ~{ append getattr ioctl read write map };
')
# On TREBLE devices, a limited set of files in /vendor are accessible to