diff options
| author | padarshr <padarshr@codeaurora.org> | 2018-07-30 19:58:38 +0530 |
|---|---|---|
| committer | doc HD <doc.divxm@gmail.com> | 2019-01-13 23:21:37 +0300 |
| commit | 2206d8ca3ff0d3dde5afc9df9de3b45f324c3721 (patch) | |
| tree | 98cf32f437636a976c48312f3711d22b620d686e | |
| parent | a97ab87d9eee7dca3d2d8639f092948c36b8abb3 (diff) | |
Remove vendor se-labelling of AOSP's qemu.hw.mainkeys prop.
This removes the se-labelling of qemu.hw.mainkeys property
from vendor side. AOSP defined property is no longer
allowed to be se-labelled from vendor side.
Change-Id: Ifeec94911bf61c3fc8b2de3b86349cc88c033071
| -rw-r--r-- | common/init_shell.te | 1 | ||||
| -rw-r--r-- | common/property_contexts | 1 | ||||
| -rw-r--r-- | common/system_server.te | 1 |
3 files changed, 0 insertions, 3 deletions
diff --git a/common/init_shell.te b/common/init_shell.te index 9b338aa..fb8ee88 100644 --- a/common/init_shell.te +++ b/common/init_shell.te @@ -91,7 +91,6 @@ set_prop(qti_init_shell, opengles_prop) set_prop(qti_init_shell, mdm_helper_prop) set_prop(qti_init_shell, fm_prop) set_prop(qti_init_shell, usf_prop) -set_prop(qti_init_shell, qemu_hw_mainkeys_prop) set_prop(qti_init_shell, alarm_boot_prop) set_prop(qti_init_shell, boot_animation_prop) set_prop(qti_init_shell, debug_gralloc_prop) diff --git a/common/property_contexts b/common/property_contexts index 073395e..acd71c4 100644 --- a/common/property_contexts +++ b/common/property_contexts @@ -72,7 +72,6 @@ persist.rmnet.mux u:object_r:rmnet_mux_prop:s0 sys.usb.controller u:object_r:sys_usb_controller_prop:s0 sys.usb.configfs u:object_r:sys_usb_configfs_prop:s0 sys.usb.tethering u:object_r:sys_usb_tethering_prop:s0 -qemu.hw.mainkeys u:object_r:qemu_hw_mainkeys_prop:s0 ro.dbg.coresight.cfg_file u:object_r:coresight_prop:s0 ctl.hbtp u:object_r:ctl_hbtp_prop:s0 vendor.audio.sys.init u:object_r:audio_prop:s0 diff --git a/common/system_server.te b/common/system_server.te index c64455c..905f8c0 100644 --- a/common/system_server.te +++ b/common/system_server.te @@ -165,7 +165,6 @@ allow system_server sysfs_graphics:file rw_file_perms; allow system_server { location_app system_app } :file write; allow system_server opengles_prop:file r_file_perms; allow system_server graphics_vulkan_prop:file r_file_perms; -allow system_server qemu_hw_mainkeys_prop:file r_file_perms; allow system_server hwui_prop:file r_file_perms; allow system_server bservice_prop:file r_file_perms; |
