summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorvishal <vishal.bhoj@linaro.org>2018-04-09 19:25:33 +0530
committerVishal Bhoj <vishal.bhoj@linaro.org>2018-04-09 14:23:12 +0000
commite6bfbb1049a58a62a921dbddbb14165d6ed8a917 (patch)
tree576d2baca263ad1d2ed89b299f013cbd8f637650
parent4d4c1aad1162ec3a96cff32ebe888291932d0824 (diff)
downloadcommon-linaro-oreo-arm.tar.gz
disable policy voilating treblelinaro-oreo-arm
Change-Id: If0dbe029ca3c35e353940cc0b1318fa7b4a4f972 Signed-off-by: vishal <vishal@localhost.localdomain>
-rw-r--r--sepolicy/file_contexts2
-rw-r--r--sepolicy/gatord.te4
-rw-r--r--sepolicy/init.te6
-rw-r--r--sepolicy/linaro.te18
-rw-r--r--sepolicy/netd.te4
5 files changed, 17 insertions, 17 deletions
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts
index f789ca4..653fcce 100644
--- a/sepolicy/file_contexts
+++ b/sepolicy/file_contexts
@@ -7,4 +7,4 @@
/dev/dri/card0 u:object_r:gpu_device:s0
/dev/hci_tty u:object_r:hci_attach_dev:s0
/dev/ttyAMA1 u:object_r:hci_attach_dev:s0
-/system/bin/faketsd u:object_r:linaro_exec:s0
+#/system/bin/faketsd u:object_r:linaro_exec:s0
diff --git a/sepolicy/gatord.te b/sepolicy/gatord.te
index 2943a9b..0829195 100644
--- a/sepolicy/gatord.te
+++ b/sepolicy/gatord.te
@@ -1,3 +1,3 @@
-type gatord, domain, mlstrustedsubject;
+#type gatord, domain, mlstrustedsubject;
-permissive gatord;
+#permissive gatord;
diff --git a/sepolicy/init.te b/sepolicy/init.te
index 0b93bc1..594e329 100644
--- a/sepolicy/init.te
+++ b/sepolicy/init.te
@@ -4,12 +4,12 @@ userdebug_or_eng(`
allow init self:capability { sys_module };
allow init self:tcp_socket create;
-allow init gatord:process { transition rlimitinh siginh };
+# allow init gatord:process { transition rlimitinh siginh };
allow init kernel:system module_request;
allow init tmpfs:lnk_file create_file_perms;
allow init cache_file:dir mounton;
allow init storage_file:dir mounton;
allow init debugfs:dir mounton;
-domain_trans(init, rootfs, linaro)
-domain_trans(init, linaro_exec, linaro)
+#domain_trans(init, rootfs, linaro)
+#domain_trans(init, linaro_exec, linaro)
diff --git a/sepolicy/linaro.te b/sepolicy/linaro.te
index f84d7db..55fd814 100644
--- a/sepolicy/linaro.te
+++ b/sepolicy/linaro.te
@@ -1,13 +1,13 @@
-type linaro, domain, mlstrustedsubject;
-type linaro_exec, exec_type, file_type;
+#type linaro, domain, mlstrustedsubject;
+#type linaro_exec, exec_type, file_type;
-init_daemon_domain(linaro)
+#init_daemon_domain(linaro)
-allow linaro sysfs:file write;
-allow linaro proc:file write;
-allow linaro system_file:file execute_no_trans;
-allow linaro shell_exec:file rx_file_perms;
+#allow linaro sysfs:file write;
+#allow linaro proc:file write;
+#allow linaro system_file:file execute_no_trans;
+#allow linaro shell_exec:file rx_file_perms;
-allow linaro self:capability dac_override;
+#allow linaro self:capability dac_override;
-permissive linaro;
+#permissive linaro;
diff --git a/sepolicy/netd.te b/sepolicy/netd.te
index ee36425..1b237cf 100644
--- a/sepolicy/netd.te
+++ b/sepolicy/netd.te
@@ -2,5 +2,5 @@ dontaudit netd self:capability sys_module;
allow netd usermodehelper:file r_file_perms;
allow netd debug_prop:property_service set;
allow netd kernel:system module_request;
-allow netd gatord:fd use;
-allow netd gatord:tcp_socket rw_socket_perms;
+#allow netd gatord:fd use;
+#allow netd gatord:tcp_socket rw_socket_perms;