aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/priv_app.te
diff options
context:
space:
mode:
authorDavide Garberi <dade.garberi@gmail.com>2018-10-30 22:26:47 +0100
committerDavide Garberi <dade.garberi@gmail.com>2018-10-31 15:23:08 +0100
commitcb0e640f160da2f9ea55b7892e21a4fcfff6e0f4 (patch)
tree08f209a438ffadb4b7da0f724e5e0cb8f6bd080d /sepolicy/priv_app.te
parent43413200cf620d3eb29b744d4dc8e8cb1a2d9ebe (diff)
msm8996-common: sepolicy: Cleanup
* Mostly squash the various macros Change-Id: I1e71a6d728cd4d7e7be057604978264c429aed90 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
Diffstat (limited to 'sepolicy/priv_app.te')
-rw-r--r--sepolicy/priv_app.te25
1 files changed, 2 insertions, 23 deletions
diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te
index 22617da..9439899 100644
--- a/sepolicy/priv_app.te
+++ b/sepolicy/priv_app.te
@@ -1,28 +1,7 @@
allow priv_app adsprpcd_file:filesystem getattr;
-allow priv_app asec_apk_file:dir r_dir_perms;
-allow priv_app bt_firmware_file:dir r_dir_perms;
-allow priv_app cache_private_backup_file:dir r_dir_perms;
-allow priv_app cgroup:dir r_dir_perms;
-allow priv_app configfs:dir r_dir_perms;
-allow priv_app configfs:file r_file_perms;
-allow priv_app file_contexts_file:file r_file_perms;
-allow priv_app firmware_file:dir r_file_perms;
+allow priv_app { asec_apk_file bt_firmware_file cache_private_backup_file cgroup configfs mnt_media_rw_file radio_data_file }:dir r_dir_perms;
+allow priv_app { configfs file_contexts_file firmware_file hwservice_contexts_file keylayout_file mac_perms_file nonplat_service_contexts_file proc proc_interrupts proc_modules proc_stat seapp_contexts_file sepolicy_file service_contexts_file vendor_file vndservice_contexts_file }:file r_file_perms;
allow priv_app hal_memtrack_hwservice:hwservice_manager find;
-allow priv_app hwservice_contexts_file:file r_file_perms;
-allow priv_app keylayout_file:dir r_file_perms;
-allow priv_app mac_perms_file:file r_file_perms;
-allow priv_app mnt_media_rw_file:dir r_dir_perms;
-allow priv_app nonplat_service_contexts_file:file r_file_perms;
-allow priv_app proc_stat:file r_file_perms;
-allow priv_app radio_data_file:dir r_dir_perms;
-allow priv_app seapp_contexts_file:file r_file_perms;
-allow priv_app sepolicy_file:file r_file_perms;
-allow priv_app service_contexts_file:file r_file_perms;
-allow priv_app vendor_file:file rx_file_perms;
-allow priv_app vndservice_contexts_file:file r_file_perms;
-allow priv_app proc_interrupts:file r_file_perms;
-allow priv_app proc_modules:file r_file_perms;
-allow priv_app proc:file r_file_perms;
allow priv_app device:dir open;
r_dir_file(priv_app, sysfs_type);