Revert "add sepolicy for set_usb_irq.sh" am: bf9ec40ab7
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2086225 Change-Id: Id9ebe6c1a58dbd45fe2dc381cf79f8be2fbb2287 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
commit
9a2c989fb7
2 changed files with 0 additions and 14 deletions
1
whitechapel/vendor/google/file_contexts
vendored
1
whitechapel/vendor/google/file_contexts
vendored
|
@ -282,7 +282,6 @@
|
||||||
/vendor/bin/init\.insmod\.sh u:object_r:init-insmod-sh_exec:s0
|
/vendor/bin/init\.insmod\.sh u:object_r:init-insmod-sh_exec:s0
|
||||||
|
|
||||||
# USB
|
# USB
|
||||||
/vendor/bin/hw/set_usb_irq\.sh u:object_r:set-usb-irq-sh_exec:s0
|
|
||||||
/vendor/bin/hw/disable_contaminant_detection\.sh u:object_r:disable-contaminant-detection-sh_exec:s0
|
/vendor/bin/hw/disable_contaminant_detection\.sh u:object_r:disable-contaminant-detection-sh_exec:s0
|
||||||
|
|
||||||
# NFC
|
# NFC
|
||||||
|
|
13
whitechapel/vendor/google/set-usb-irq-sh.te
vendored
13
whitechapel/vendor/google/set-usb-irq-sh.te
vendored
|
@ -1,13 +0,0 @@
|
||||||
type set-usb-irq-sh, domain;
|
|
||||||
type set-usb-irq-sh_exec, vendor_file_type, exec_type, file_type;
|
|
||||||
init_daemon_domain(set-usb-irq-sh)
|
|
||||||
|
|
||||||
allow set-usb-irq-sh vendor_toolbox_exec:file execute_no_trans;
|
|
||||||
|
|
||||||
allow set-usb-irq-sh proc_irq:dir r_dir_perms;
|
|
||||||
allow set-usb-irq-sh proc_irq:file w_file_perms;
|
|
||||||
|
|
||||||
# AFAICT this happens if /proc/irq updates as we're running
|
|
||||||
# and we end up trying to write into non-existing file,
|
|
||||||
# which implies creation...
|
|
||||||
dontaudit set-usb-irq-sh self:capability dac_override;
|
|
Loading…
Add table
Add a link
Reference in a new issue