diff options
author | vishal <vishal.bhoj@linaro.org> | 2018-04-09 19:25:33 +0530 |
---|---|---|
committer | Vishal Bhoj <vishal.bhoj@linaro.org> | 2018-04-09 14:23:12 +0000 |
commit | e6bfbb1049a58a62a921dbddbb14165d6ed8a917 (patch) | |
tree | 576d2baca263ad1d2ed89b299f013cbd8f637650 | |
parent | 4d4c1aad1162ec3a96cff32ebe888291932d0824 (diff) | |
download | common-linaro-oreo-arm.tar.gz |
disable policy voilating treblelinaro-oreo-arm
Change-Id: If0dbe029ca3c35e353940cc0b1318fa7b4a4f972
Signed-off-by: vishal <vishal@localhost.localdomain>
-rw-r--r-- | sepolicy/file_contexts | 2 | ||||
-rw-r--r-- | sepolicy/gatord.te | 4 | ||||
-rw-r--r-- | sepolicy/init.te | 6 | ||||
-rw-r--r-- | sepolicy/linaro.te | 18 | ||||
-rw-r--r-- | sepolicy/netd.te | 4 |
5 files changed, 17 insertions, 17 deletions
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts index f789ca4..653fcce 100644 --- a/sepolicy/file_contexts +++ b/sepolicy/file_contexts @@ -7,4 +7,4 @@ /dev/dri/card0 u:object_r:gpu_device:s0 /dev/hci_tty u:object_r:hci_attach_dev:s0 /dev/ttyAMA1 u:object_r:hci_attach_dev:s0 -/system/bin/faketsd u:object_r:linaro_exec:s0 +#/system/bin/faketsd u:object_r:linaro_exec:s0 diff --git a/sepolicy/gatord.te b/sepolicy/gatord.te index 2943a9b..0829195 100644 --- a/sepolicy/gatord.te +++ b/sepolicy/gatord.te @@ -1,3 +1,3 @@ -type gatord, domain, mlstrustedsubject; +#type gatord, domain, mlstrustedsubject; -permissive gatord; +#permissive gatord; diff --git a/sepolicy/init.te b/sepolicy/init.te index 0b93bc1..594e329 100644 --- a/sepolicy/init.te +++ b/sepolicy/init.te @@ -4,12 +4,12 @@ userdebug_or_eng(` allow init self:capability { sys_module }; allow init self:tcp_socket create; -allow init gatord:process { transition rlimitinh siginh }; +# allow init gatord:process { transition rlimitinh siginh }; allow init kernel:system module_request; allow init tmpfs:lnk_file create_file_perms; allow init cache_file:dir mounton; allow init storage_file:dir mounton; allow init debugfs:dir mounton; -domain_trans(init, rootfs, linaro) -domain_trans(init, linaro_exec, linaro) +#domain_trans(init, rootfs, linaro) +#domain_trans(init, linaro_exec, linaro) diff --git a/sepolicy/linaro.te b/sepolicy/linaro.te index f84d7db..55fd814 100644 --- a/sepolicy/linaro.te +++ b/sepolicy/linaro.te @@ -1,13 +1,13 @@ -type linaro, domain, mlstrustedsubject; -type linaro_exec, exec_type, file_type; +#type linaro, domain, mlstrustedsubject; +#type linaro_exec, exec_type, file_type; -init_daemon_domain(linaro) +#init_daemon_domain(linaro) -allow linaro sysfs:file write; -allow linaro proc:file write; -allow linaro system_file:file execute_no_trans; -allow linaro shell_exec:file rx_file_perms; +#allow linaro sysfs:file write; +#allow linaro proc:file write; +#allow linaro system_file:file execute_no_trans; +#allow linaro shell_exec:file rx_file_perms; -allow linaro self:capability dac_override; +#allow linaro self:capability dac_override; -permissive linaro; +#permissive linaro; diff --git a/sepolicy/netd.te b/sepolicy/netd.te index ee36425..1b237cf 100644 --- a/sepolicy/netd.te +++ b/sepolicy/netd.te @@ -2,5 +2,5 @@ dontaudit netd self:capability sys_module; allow netd usermodehelper:file r_file_perms; allow netd debug_prop:property_service set; allow netd kernel:system module_request; -allow netd gatord:fd use; -allow netd gatord:tcp_socket rw_socket_perms; +#allow netd gatord:fd use; +#allow netd gatord:tcp_socket rw_socket_perms; |