diff options
author | Sumit Semwal <sumit.semwal@linaro.org> | 2018-06-20 21:32:34 +0530 |
---|---|---|
committer | Sumit Semwal <sumit.semwal@linaro.org> | 2018-07-25 11:24:19 +0530 |
commit | f30b25ee0b1a626913acda648b521b2057154fab (patch) | |
tree | b6ee79e41331a846b027f28a410acb8e5c549f96 | |
parent | 5cfd4ca6582b7403874f183156a75b2e03c117ad (diff) |
db: sepolicy: HACK: treble: disable tinymix.
Without this, we get this failure during build:
libsepol.report_failure: neverallow on line 999 of
system/sepolicy/public/domain.te (or line 11966 of policy.conf)
violated by allow tinymix tinymix_exec:file { execute entrypoint };
Change-Id: I0d67458f35161e444940b72addc149c009df89d2
Signed-off-by: Sumit Semwal <sumit.semwal@linaro.org>
-rw-r--r-- | sepolicy/file_contexts | 2 | ||||
-rw-r--r-- | sepolicy/tinymix.te | 10 |
2 files changed, 5 insertions, 7 deletions
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts index e151827..141d646 100644 --- a/sepolicy/file_contexts +++ b/sepolicy/file_contexts @@ -9,8 +9,6 @@ /sys/devices/platform/soc/900000.mdss u:object_r:sysfs_mdss:s0 /sys/devices/platform/soc/1a00000.mdss u:object_r:sysfs_mdss:s0 -/system/bin/tinymix u:object_r:tinymix_exec:s0 - /(vendor|system/vendor)/lib(64)?/hw/gralloc\.gbm\.so u:object_r:same_process_hal_file:s0 /(vendor|system/vendor)/lib(64)?/libglapi\.so u:object_r:same_process_hal_file:s0 /(vendor|system/vendor)/lib(64)?/libdrm\.so u:object_r:same_process_hal_file:s0 diff --git a/sepolicy/tinymix.te b/sepolicy/tinymix.te index 6e7ef54..3acb861 100644 --- a/sepolicy/tinymix.te +++ b/sepolicy/tinymix.te @@ -1,7 +1,7 @@ -type tinymix, domain; -type tinymix_exec, exec_type, file_type; +#type tinymix, domain; +#type tinymix_exec, exec_type, file_type; -init_daemon_domain(tinymix) +#init_daemon_domain(tinymix) -allow tinymix audio_device:chr_file { ioctl open read write }; -allow tinymix audio_device:dir search; +#allow tinymix audio_device:chr_file { ioctl open read write }; +#allow tinymix audio_device:dir search; |