From 832ec4a0d5abaa508a3dc30ab56123c594746550 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?D=2E=20Andrei=20M=C4=83ce=C8=99?= Date: Sat, 8 Oct 2016 17:36:30 -0400 Subject: sepolicy: Remove setup_fs support Change-Id: I333809aa66f0dfcc4a89bd148d3eb77789ec3707 --- sepolicy/file_contexts | 1 - sepolicy/setup_fs.te | 14 -------------- 2 files changed, 15 deletions(-) delete mode 100644 sepolicy/setup_fs.te diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts index cc930ba..3c066ca 100644 --- a/sepolicy/file_contexts +++ b/sepolicy/file_contexts @@ -20,7 +20,6 @@ # System and vendor files /system/bin/sensors-load-calibration.sh u:object_r:sensors_load_calibration_exec:s0 -/system/bin/setup_fs u:object_r:setupfs_exec:s0 # Sysfs files /sys/class/gpio/gpio162/value u:object_r:sysfs_gps_writable:s0 diff --git a/sepolicy/setup_fs.te b/sepolicy/setup_fs.te deleted file mode 100644 index e6bfc0d..0000000 --- a/sepolicy/setup_fs.te +++ /dev/null @@ -1,14 +0,0 @@ -type setupfs, domain; -type setupfs_exec, exec_type, file_type; - -init_daemon_domain(setupfs) - -allow setupfs userdata_block_device:blk_file rw_file_perms; -allow setupfs cache_block_device:blk_file rw_file_perms; -allow setupfs block_device:dir search; - - -# Only allow entry from init -neverallow { domain -init } setupfs:process transition; -neverallow domain setupfs:process dyntransition; -neverallow setupfs { file_type fs_type -setupfs_exec }:file entrypoint; -- cgit v1.2.3