summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorpadarshr <padarshr@codeaurora.org>2018-07-30 19:58:38 +0530
committerdoc HD <doc.divxm@gmail.com>2019-01-13 23:21:37 +0300
commit2206d8ca3ff0d3dde5afc9df9de3b45f324c3721 (patch)
tree98cf32f437636a976c48312f3711d22b620d686e
parenta97ab87d9eee7dca3d2d8639f092948c36b8abb3 (diff)
Remove vendor se-labelling of AOSP's qemu.hw.mainkeys prop.
This removes the se-labelling of qemu.hw.mainkeys property from vendor side. AOSP defined property is no longer allowed to be se-labelled from vendor side. Change-Id: Ifeec94911bf61c3fc8b2de3b86349cc88c033071
-rw-r--r--common/init_shell.te1
-rw-r--r--common/property_contexts1
-rw-r--r--common/system_server.te1
3 files changed, 0 insertions, 3 deletions
diff --git a/common/init_shell.te b/common/init_shell.te
index 9b338aa..fb8ee88 100644
--- a/common/init_shell.te
+++ b/common/init_shell.te
@@ -91,7 +91,6 @@ set_prop(qti_init_shell, opengles_prop)
set_prop(qti_init_shell, mdm_helper_prop)
set_prop(qti_init_shell, fm_prop)
set_prop(qti_init_shell, usf_prop)
-set_prop(qti_init_shell, qemu_hw_mainkeys_prop)
set_prop(qti_init_shell, alarm_boot_prop)
set_prop(qti_init_shell, boot_animation_prop)
set_prop(qti_init_shell, debug_gralloc_prop)
diff --git a/common/property_contexts b/common/property_contexts
index 073395e..acd71c4 100644
--- a/common/property_contexts
+++ b/common/property_contexts
@@ -72,7 +72,6 @@ persist.rmnet.mux u:object_r:rmnet_mux_prop:s0
sys.usb.controller u:object_r:sys_usb_controller_prop:s0
sys.usb.configfs u:object_r:sys_usb_configfs_prop:s0
sys.usb.tethering u:object_r:sys_usb_tethering_prop:s0
-qemu.hw.mainkeys u:object_r:qemu_hw_mainkeys_prop:s0
ro.dbg.coresight.cfg_file u:object_r:coresight_prop:s0
ctl.hbtp u:object_r:ctl_hbtp_prop:s0
vendor.audio.sys.init u:object_r:audio_prop:s0
diff --git a/common/system_server.te b/common/system_server.te
index c64455c..905f8c0 100644
--- a/common/system_server.te
+++ b/common/system_server.te
@@ -165,7 +165,6 @@ allow system_server sysfs_graphics:file rw_file_perms;
allow system_server { location_app system_app } :file write;
allow system_server opengles_prop:file r_file_perms;
allow system_server graphics_vulkan_prop:file r_file_perms;
-allow system_server qemu_hw_mainkeys_prop:file r_file_perms;
allow system_server hwui_prop:file r_file_perms;
allow system_server bservice_prop:file r_file_perms;