diff options
author | Davide Garberi <dade.garberi@gmail.com> | 2019-02-03 21:32:15 +0100 |
---|---|---|
committer | Davide Garberi <dade.garberi@gmail.com> | 2019-02-06 13:56:15 +0100 |
commit | ebadfdde778dc77d979df9b3178d190ae93ccfbc (patch) | |
tree | 9bebe62d85452fcca6a0cb543fe44c3c87dac1ce /sepolicy/priv_app.te | |
parent | 61195c01b666bf3a8cae3f63a1c474bf8a257d65 (diff) |
msm8996-common: sepolicy: Nuke the neverallows
* Also fix other general sepolicy errors after stopping to ignore the neverallows
Change-Id: I1af3d9f57a0ca6e37420094a53f1c52127f3e187
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
Diffstat (limited to 'sepolicy/priv_app.te')
-rw-r--r-- | sepolicy/priv_app.te | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te index 9439899..cc763ca 100644 --- a/sepolicy/priv_app.te +++ b/sepolicy/priv_app.te @@ -1,10 +1,9 @@ allow priv_app adsprpcd_file:filesystem getattr; allow priv_app { asec_apk_file bt_firmware_file cache_private_backup_file cgroup configfs mnt_media_rw_file radio_data_file }:dir r_dir_perms; -allow priv_app { configfs file_contexts_file firmware_file hwservice_contexts_file keylayout_file mac_perms_file nonplat_service_contexts_file proc proc_interrupts proc_modules proc_stat seapp_contexts_file sepolicy_file service_contexts_file vendor_file vndservice_contexts_file }:file r_file_perms; +allow priv_app { file_contexts_file firmware_file hwservice_contexts_file keylayout_file mac_perms_file nonplat_service_contexts_file proc_interrupts proc_modules proc_stat seapp_contexts_file sepolicy_file service_contexts_file vendor_file vndservice_contexts_file }:file r_file_perms; allow priv_app hal_memtrack_hwservice:hwservice_manager find; allow priv_app device:dir open; -r_dir_file(priv_app, sysfs_type); binder_call(priv_app, hal_memtrack_default); # Clean up logspam |