Address new neverallow policies
Change-Id: I3fa9d205956c5a89f610893a9fd8d855b0383fd6
This commit is contained in:
		
							
								
								
									
										3
									
								
								vendor/common/cnd.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								vendor/common/cnd.te
									
									
									
									
										vendored
									
									
								
							@@ -36,9 +36,6 @@ allow cnd cnd_data_file:file create_file_perms;
 | 
			
		||||
allow cnd cnd_data_file:sock_file { unlink create setattr };
 | 
			
		||||
allow cnd cnd_data_file:dir rw_dir_perms;
 | 
			
		||||
 | 
			
		||||
allow cnd wpa_socket:dir rw_dir_perms;
 | 
			
		||||
allow cnd wpa_socket:sock_file { create unlink setattr };
 | 
			
		||||
 | 
			
		||||
allow cnd self:socket ioctl;
 | 
			
		||||
allowxperm cnd self:socket ioctl msm_sock_ipc_ioctls;
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/file.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/file.te
									
									
									
									
										vendored
									
									
								
							@@ -99,4 +99,4 @@ type rfs_file, file_type, data_file_type;
 | 
			
		||||
type adsprpcd_file, file_type, mlstrustedobject;
 | 
			
		||||
 | 
			
		||||
type hbtp_log_file, file_type, data_file_type;
 | 
			
		||||
type hbtp_cfg_file, file_type;
 | 
			
		||||
type hbtp_cfg_file, file_type, vendor_file_type;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/file_contexts
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/file_contexts
									
									
									
									
										vendored
									
									
								
							@@ -182,10 +182,8 @@
 | 
			
		||||
/data/vendor/ipa(/.*)?                 u:object_r:ipa_vendor_data_file:s0
 | 
			
		||||
/data/vendor/sensors(/.*)?             u:object_r:sensors_vendor_data_file:s0
 | 
			
		||||
 | 
			
		||||
/data/connectivity(/.*)?               u:object_r:cnd_data_file:s0
 | 
			
		||||
/data/vendor/connectivity(/.*)?        u:object_r:cnd_data_file:s0
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
# /
 | 
			
		||||
/tombstones             u:object_r:rootfs:s0
 | 
			
		||||
/dsp(/.*)?              u:object_r:adsprpcd_file:s0
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/hal_wifi_supplicant.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/hal_wifi_supplicant.te
									
									
									
									
										vendored
									
									
								
							@@ -35,8 +35,6 @@ allowxperm hal_wifi_supplicant_default self:socket ioctl msm_sock_ipc_ioctls;
 | 
			
		||||
allow hal_wifi_supplicant_default wifi_vendor_data_file:dir create_dir_perms;
 | 
			
		||||
allow hal_wifi_supplicant_default wifi_vendor_data_file:dir w_dir_perms;
 | 
			
		||||
allow hal_wifi_supplicant_default wifi_vendor_data_file:file create_file_perms;
 | 
			
		||||
allow hal_wifi_supplicant_default wpa_socket:dir create_dir_perms;
 | 
			
		||||
allow hal_wifi_supplicant_default wpa_socket:sock_file create_file_perms;
 | 
			
		||||
# Permission for wpa socket which IMS use to communicate
 | 
			
		||||
# # Allow wpa_supplicant to send back wifi information to cnd
 | 
			
		||||
allow hal_wifi_supplicant_default { cnd ims }:unix_dgram_socket sendto;
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user