aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordd3boh <dade.garberi@gmail.com>2017-11-03 16:53:27 +0100
committerdd3boh <dade.garberi@gmail.com>2017-11-04 18:37:15 +0100
commit1acb2b3f27520dc7d1dafee850bbc5e2562b3cf4 (patch)
treeb964a66805ef2473905d2c82f5ea7aadfd10c70a
parenta18ae7d8278f9be32946f3f67dbf0c49add82b31 (diff)
msm8996-common: Nuke the Nougat sepolicy
Signed-off-by: dd3boh <dade.garberi@gmail.com>
-rw-r--r--sepolicy/audioserver.te4
-rw-r--r--sepolicy/bootstat.te1
-rw-r--r--sepolicy/charger_monitor.te3
-rw-r--r--sepolicy/cnd.te5
-rw-r--r--sepolicy/dataservice_app.te1
-rw-r--r--sepolicy/debuggerd.te1
-rw-r--r--sepolicy/device.te1
-rw-r--r--sepolicy/dpmd.te4
-rw-r--r--sepolicy/energyawareness.te2
-rw-r--r--sepolicy/file.te12
-rw-r--r--sepolicy/file_contexts35
-rw-r--r--sepolicy/fingerprintd.te16
-rw-r--r--sepolicy/genfs_contexts4
-rw-r--r--sepolicy/hostapd.te1
-rw-r--r--sepolicy/ims.te6
-rw-r--r--sepolicy/init.te2
-rw-r--r--sepolicy/ipacm-diag.te5
-rw-r--r--sepolicy/kernel.te3
-rw-r--r--sepolicy/location.te4
-rw-r--r--sepolicy/log.te3
-rw-r--r--sepolicy/mediaserver.te6
-rw-r--r--sepolicy/mm-pp-daemon.te4
-rw-r--r--sepolicy/mm-qcamerad.te5
-rw-r--r--sepolicy/netd.te2
-rw-r--r--sepolicy/netmgrd.te6
-rw-r--r--sepolicy/per_mgr.te1
-rw-r--r--sepolicy/perfd.te1
-rw-r--r--sepolicy/priv_app.te2
-rw-r--r--sepolicy/property.te1
-rw-r--r--sepolicy/property_contexts6
-rw-r--r--sepolicy/qmuxd.te4
-rw-r--r--sepolicy/qti.te4
-rw-r--r--sepolicy/qti_init_shell.te5
-rw-r--r--sepolicy/readmac.te18
-rw-r--r--sepolicy/rfs_access.te1
-rw-r--r--sepolicy/rild.te7
-rw-r--r--sepolicy/rmt_storage.te1
-rw-r--r--sepolicy/sdcardd.te1
-rw-r--r--sepolicy/sensors.te4
-rw-r--r--sepolicy/shell.te4
-rw-r--r--sepolicy/surfaceflinger.te4
-rw-r--r--sepolicy/sysinit.te17
-rw-r--r--sepolicy/system_app.te4
-rw-r--r--sepolicy/system_server.te21
-rw-r--r--sepolicy/thermal-engine.te9
-rw-r--r--sepolicy/time_daemon.te5
-rw-r--r--sepolicy/ueventd.te1
-rw-r--r--sepolicy/uncrypt.te2
-rw-r--r--sepolicy/untrusted_app.te1
-rw-r--r--sepolicy/vold.te2
-rw-r--r--sepolicy/wcnss_filter.te2
-rw-r--r--sepolicy/wcnss_service.te14
-rw-r--r--sepolicy/zygote.te3
53 files changed, 0 insertions, 281 deletions
diff --git a/sepolicy/audioserver.te b/sepolicy/audioserver.te
deleted file mode 100644
index 65a6bf3..0000000
--- a/sepolicy/audioserver.te
+++ /dev/null
@@ -1,4 +0,0 @@
-set_prop(audioserver, diag_prop);
-allow audioserver diag_device:chr_file { read write };
-allow audioserver diag_device:chr_file open;
-allow audioserver diag_device:chr_file ioctl;
diff --git a/sepolicy/bootstat.te b/sepolicy/bootstat.te
deleted file mode 100644
index ffe9fc3..0000000
--- a/sepolicy/bootstat.te
+++ /dev/null
@@ -1 +0,0 @@
-allow bootstat rootfs:lnk_file { getattr };
diff --git a/sepolicy/charger_monitor.te b/sepolicy/charger_monitor.te
deleted file mode 100644
index f658037..0000000
--- a/sepolicy/charger_monitor.te
+++ /dev/null
@@ -1,3 +0,0 @@
-# DASH
-allow healthd healthd:capability { dac_override dac_read_search };
-allow healthd device:dir read;
diff --git a/sepolicy/cnd.te b/sepolicy/cnd.te
deleted file mode 100644
index 654dece..0000000
--- a/sepolicy/cnd.te
+++ /dev/null
@@ -1,5 +0,0 @@
-allow cnd diag_prop:property_service set;
-get_prop(cnd, diag_prop);
-allow cnd diag_device:chr_file { read write };
-allow cnd diag_device:chr_file open;
-allow cnd diag_device:chr_file ioctl;
diff --git a/sepolicy/dataservice_app.te b/sepolicy/dataservice_app.te
deleted file mode 100644
index 919f269..0000000
--- a/sepolicy/dataservice_app.te
+++ /dev/null
@@ -1 +0,0 @@
-set_prop(dataservice_app, diag_prop);
diff --git a/sepolicy/debuggerd.te b/sepolicy/debuggerd.te
deleted file mode 100644
index 974c172..0000000
--- a/sepolicy/debuggerd.te
+++ /dev/null
@@ -1 +0,0 @@
-allow debuggerd app_data_file:dir search;
diff --git a/sepolicy/device.te b/sepolicy/device.te
deleted file mode 100644
index e271129..0000000
--- a/sepolicy/device.te
+++ /dev/null
@@ -1 +0,0 @@
-type fpc1020_device, dev_type;
diff --git a/sepolicy/dpmd.te b/sepolicy/dpmd.te
deleted file mode 100644
index 5a47688..0000000
--- a/sepolicy/dpmd.te
+++ /dev/null
@@ -1,4 +0,0 @@
-get_prop(dpmd, diag_prop);
-allow dpmd diag_device:chr_file { read write };
-allow dpmd diag_device:chr_file open;
-allow dpmd diag_device:chr_file ioctl;
diff --git a/sepolicy/energyawareness.te b/sepolicy/energyawareness.te
deleted file mode 100644
index 4cde0c1..0000000
--- a/sepolicy/energyawareness.te
+++ /dev/null
@@ -1,2 +0,0 @@
-allow energyawareness debugfs_msm_core:file rw_file_perms;
-allow energyawareness debugfs_msm_core:dir r_dir_perms;
diff --git a/sepolicy/file.te b/sepolicy/file.te
deleted file mode 100644
index 1ba40c1..0000000
--- a/sepolicy/file.te
+++ /dev/null
@@ -1,12 +0,0 @@
-type fpc_data_file, file_type;
-type fpc_images_file, file_type;
-type sysfs_fpc_irq, sysfs_type, fs_type;
-type sysfs_fpc_proximity, sysfs_type, fs_type;
-type sysfs_fpc_utouch_disable, fs_type, sysfs_type;
-type proc_touchpanel, fs_type;
-type nv_data_file, file_type;
-type proc_stat, fs_type;
-type debugfs_msm_core, debugfs_type, fs_type;
-type debugfs_rmts, debugfs_type, fs_type;
-type thermal_data_file, file_type;
-type netmgrd_data_file, file_type;
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts
deleted file mode 100644
index 979f833..0000000
--- a/sepolicy/file_contexts
+++ /dev/null
@@ -1,35 +0,0 @@
-# We have a couple of non-standard NV partitions
-/dev/block/bootdevice/by-name/oem_dycnvbk u:object_r:modem_efs_partition_device:s0
-/dev/block/bootdevice/by-name/oem_stanvbk u:object_r:modem_efs_partition_device:s0
-
-# FRP partition
-/dev/block/bootdevice/by-name/config u:object_r:frp_block_device:s0
-
-/persist/sensors/gyro_sensitity_cal u:object_r:sensors_persist_file:s0
-
-/data/oemnvitems(/.*)? u:object_r:nv_data_file:s0
-
-/dev/fpc1020 u:object_r:fpc1020_device:s0
-/data/fpc(/.*)? u:object_r:fpc_data_file:s0
-/data/fpc_images(/.*)? u:object_r:fpc_images_file:s0
-/sys/devices/soc/soc:fpc_fpc1020/irq u:object_r:sysfs_fpc_irq:s0
-/sys/devices/soc/soc:fpc_fpc1020/proximity_state u:object_r:sysfs_fpc_proximity:s0
-/sys/devices/soc/soc:fpc1020/utouch_disable u:object_r:sysfs_fpc_utouch_disable:s0
-
-/dev/dash u:object_r:input_device:s0
-/sys/devices/soc/.*ssusb/power_supply/usb(/.*)? u:object_r:sysfs_usb_supply:s0
-
-/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/capacity u:object_r:sysfs_batteryinfo:s0
-/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/current_now u:object_r:sysfs_batteryinfo:s0
-/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/voltage_now u:object_r:sysfs_batteryinfo:s0
-/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/temp u:object_r:sysfs_batteryinfo:s0
-
-/sys/kernel/debug/msm_core(/.*)? u:object_r:debugfs_msm_core:s0
-
-/sys/kernel/debug/rmt_storage/rmts u:object_r:debugfs_rmts:s0
-
-/system/bin/readmac u:object_r:readmac_exec:s0
-
-# Data files
-/data/decrypt.txt u:object_r:thermal_data_file:s0
-/data/misc/netmgr/log.txt u:object_r:netmgrd_data_file:s0
diff --git a/sepolicy/fingerprintd.te b/sepolicy/fingerprintd.te
deleted file mode 100644
index 0a693bf..0000000
--- a/sepolicy/fingerprintd.te
+++ /dev/null
@@ -1,16 +0,0 @@
-r_dir_file(fingerprintd, firmware_file)
-r_dir_file(fingerprintd, proc_touchpanel)
-allow fingerprintd fpc_data_file:dir rw_dir_perms;
-allow fingerprintd fpc_data_file:sock_file { create unlink setattr };
-allow fingerprintd fpc_images_file:dir rw_dir_perms;
-allow fingerprintd fpc_images_file:file create_file_perms;
-allow fingerprintd sysfs_fpc_irq:file rw_file_perms;
-allow fingerprintd tee_device:chr_file rw_file_perms;
-allow fingerprintd sysfs:file write;
-allow fingerprintd vfat:file r_file_perms;
-allow fingerprintd system_data_file:dir { read write };
-allow fingerprintd system_data_file:dir { open remove_name };
-allow fingerprintd system_data_file:sock_file unlink;
-allow fingerprintd system_data_file:dir add_name;
-allow fingerprintd system_data_file:sock_file create;
-allow fingerprintd system_data_file:sock_file setattr;
diff --git a/sepolicy/genfs_contexts b/sepolicy/genfs_contexts
deleted file mode 100644
index a4d53e1..0000000
--- a/sepolicy/genfs_contexts
+++ /dev/null
@@ -1,4 +0,0 @@
-genfscon proc /touchpanel u:object_r:proc_touchpanel:s0
-genfscon proc /s1302 u:object_r:proc_touchpanel:s0
-genfscon proc /tri-state-key u:object_r:proc_touchpanel:s0
-genfscon proc /stat u:object_r:proc_stat:s0
diff --git a/sepolicy/hostapd.te b/sepolicy/hostapd.te
deleted file mode 100644
index 27c06b6..0000000
--- a/sepolicy/hostapd.te
+++ /dev/null
@@ -1 +0,0 @@
-allow hostapd hostapd:chr_file { read write };
diff --git a/sepolicy/ims.te b/sepolicy/ims.te
deleted file mode 100644
index 13f3f51..0000000
--- a/sepolicy/ims.te
+++ /dev/null
@@ -1,6 +0,0 @@
-allow ims diag_prop:property_service set;
-allow ims self:capability net_raw;
-get_prop(ims, diag_prop);
-allow ims diag_device:chr_file { read write };
-allow ims diag_device:chr_file open;
-allow ims diag_device:chr_file ioctl;
diff --git a/sepolicy/init.te b/sepolicy/init.te
deleted file mode 100644
index 23d7d46..0000000
--- a/sepolicy/init.te
+++ /dev/null
@@ -1,2 +0,0 @@
-allow init debugfs:file write;
-
diff --git a/sepolicy/ipacm-diag.te b/sepolicy/ipacm-diag.te
deleted file mode 100644
index d81b682..0000000
--- a/sepolicy/ipacm-diag.te
+++ /dev/null
@@ -1,5 +0,0 @@
-set_prop(ipacm-diag, diag_prop)
-set_prop(ipacm-diag, system_prop)
-allow ipacm-diag diag_device:chr_file { read write };
-allow ipacm-diag diag_device:chr_file open;
-allow ipacm-diag diag_device:chr_file ioctl;
diff --git a/sepolicy/kernel.te b/sepolicy/kernel.te
deleted file mode 100644
index 70a2ac8..0000000
--- a/sepolicy/kernel.te
+++ /dev/null
@@ -1,3 +0,0 @@
-allow kernel vfat:file open;
-allow kernel self:capability { dac_read_search dac_override };
-allow kernel self:socket create;
diff --git a/sepolicy/location.te b/sepolicy/location.te
deleted file mode 100644
index 73d1f32..0000000
--- a/sepolicy/location.te
+++ /dev/null
@@ -1,4 +0,0 @@
-allow location permission_service:service_manager find;
-allow location diag_device:chr_file { read write };
-allow location diag_device:chr_file open;
-allow location diag_device:chr_file ioctl;
diff --git a/sepolicy/log.te b/sepolicy/log.te
deleted file mode 100644
index 6a1fe9f..0000000
--- a/sepolicy/log.te
+++ /dev/null
@@ -1,3 +0,0 @@
-allow logd unlabeled:dir search;
-allow logd self:capability { dac_override dac_read_search };
-
diff --git a/sepolicy/mediaserver.te b/sepolicy/mediaserver.te
deleted file mode 100644
index 43c74fd..0000000
--- a/sepolicy/mediaserver.te
+++ /dev/null
@@ -1,6 +0,0 @@
-allow mediaserver audio_device:chr_file { ioctl open read write };
-allow mediaserver sensorservice_service:service_manager find;
-allow mediaserver system_server:unix_stream_socket { read write };
-allow mediaserver camera_data_file:dir search;
-allow mediaserver cameraproxy_service:service_manager find;
-allow mediaserver cameraserver_service:service_manager add;
diff --git a/sepolicy/mm-pp-daemon.te b/sepolicy/mm-pp-daemon.te
deleted file mode 100644
index 4e4a21a..0000000
--- a/sepolicy/mm-pp-daemon.te
+++ /dev/null
@@ -1,4 +0,0 @@
-allow mm-pp-daemon diag_device:chr_file rw_file_perms;
-allow mm-pp-daemon self:socket create_socket_perms;
-r_dir_file(mm-pp-daemon, sensors_persist_file);
-set_prop(mm-pp-daemon, diag_prop);
diff --git a/sepolicy/mm-qcamerad.te b/sepolicy/mm-qcamerad.te
deleted file mode 100644
index 58283b7..0000000
--- a/sepolicy/mm-qcamerad.te
+++ /dev/null
@@ -1,5 +0,0 @@
-allow mm-qcamerad camera_prop:property_service set;
-allow mm-qcamerad permission_service:service_manager find;
-allow mm-qcamerad mpctl_socket:sock_file write;
-get_prop(mm-qcamerad, diag_prop);
-unix_socket_connect(mm-qcamerad, mpctl, perfd)
diff --git a/sepolicy/netd.te b/sepolicy/netd.te
deleted file mode 100644
index f513b69..0000000
--- a/sepolicy/netd.te
+++ /dev/null
@@ -1,2 +0,0 @@
-r_dir_file(netd, firmware_file)
-allow netd vfat:file r_file_perms;
diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te
deleted file mode 100644
index 81c6213..0000000
--- a/sepolicy/netmgrd.te
+++ /dev/null
@@ -1,6 +0,0 @@
-type_transition netmgrd system_data_file:file netmgrd_data_file "log.txt";
-allow netmgrd self:capability dac_override;
-allow netmgrd netmgrd_data_file:file rw_file_perms;
-allow netmgrd diag_device:chr_file { read write };
-allow netmgrd diag_device:chr_file open;
-allow netmgrd diag_device:chr_file ioctl;
diff --git a/sepolicy/per_mgr.te b/sepolicy/per_mgr.te
deleted file mode 100644
index c964ad3..0000000
--- a/sepolicy/per_mgr.te
+++ /dev/null
@@ -1 +0,0 @@
-allow per_mgr vfat:file r_file_perms;
diff --git a/sepolicy/perfd.te b/sepolicy/perfd.te
deleted file mode 100644
index 458f70f..0000000
--- a/sepolicy/perfd.te
+++ /dev/null
@@ -1 +0,0 @@
-allow perfd system_server:file write;
diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te
deleted file mode 100644
index 72e3223..0000000
--- a/sepolicy/priv_app.te
+++ /dev/null
@@ -1,2 +0,0 @@
-allow priv_app device:dir r_dir_perms;
-allow priv_app rfs_system_file:dir r_dir_perms;
diff --git a/sepolicy/property.te b/sepolicy/property.te
deleted file mode 100644
index 85dcb78..0000000
--- a/sepolicy/property.te
+++ /dev/null
@@ -1 +0,0 @@
-type diag_prop, property_type;
diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts
deleted file mode 100644
index d9ba461..0000000
--- a/sepolicy/property_contexts
+++ /dev/null
@@ -1,6 +0,0 @@
-service.soundcard. u:object_r:audio_prop:s0
-audio. u:object_r:audio_prop:s0
-ro.sys.oem.sno u:object_r:system_radio_prop:s0
-sys.fake_bs_flag0 u:object_r:system_radio_prop:s0
-sys.fake_bs_flag1 u:object_r:system_radio_prop:s0
-
diff --git a/sepolicy/qmuxd.te b/sepolicy/qmuxd.te
deleted file mode 100644
index c0a40f4..0000000
--- a/sepolicy/qmuxd.te
+++ /dev/null
@@ -1,4 +0,0 @@
-set_prop(qmuxd, diag_prop)
-allow qmuxd diag_device:chr_file { read write };
-allow qmuxd diag_device:chr_file open;
-allow qmuxd diag_device:chr_file ioctl;
diff --git a/sepolicy/qti.te b/sepolicy/qti.te
deleted file mode 100644
index 172211a..0000000
--- a/sepolicy/qti.te
+++ /dev/null
@@ -1,4 +0,0 @@
-set_prop(qti, diag_prop)
-allow qti diag_device:chr_file { read write };
-allow qti diag_device:chr_file open;
-allow qti diag_device:chr_file ioctl;
diff --git a/sepolicy/qti_init_shell.te b/sepolicy/qti_init_shell.te
deleted file mode 100644
index 52a3a9c..0000000
--- a/sepolicy/qti_init_shell.te
+++ /dev/null
@@ -1,5 +0,0 @@
-allow qti_init_shell kmsg_device:chr_file { write open };
-allow qti_init_shell diag_prop:property_service set;
-allow qti_init_shell self:socket create_socket_perms;
-allow qti_init_shell sysfs_devices_system_cpu:file { setattr };
-qmux_socket(qti_init_shell)
diff --git a/sepolicy/readmac.te b/sepolicy/readmac.te
deleted file mode 100644
index 23e5e9b..0000000
--- a/sepolicy/readmac.te
+++ /dev/null
@@ -1,18 +0,0 @@
-type readmac, domain;
-type readmac_exec, exec_type, file_type;
-
-# Allow for transition from init domain to readmac
-init_daemon_domain(readmac)
-
-# Allow readmac to communicate with qmuxd via qmux_radio socket
-qmux_socket(readmac)
-
-# Allow readmac to fully access wlan_mac.bin persist file
-allow readmac persist_file:dir rw_dir_perms;
-allow readmac persist_file:file create_file_perms;
-
-allow readmac self:capability dac_override;
-allow readmac self:socket create_socket_perms;
-
-allow readmac diag_device:chr_file rw_file_perms;
-allow readmac sysfs:file r_file_perms;
diff --git a/sepolicy/rfs_access.te b/sepolicy/rfs_access.te
deleted file mode 100644
index f4264c9..0000000
--- a/sepolicy/rfs_access.te
+++ /dev/null
@@ -1 +0,0 @@
-allow rfs_access self:capability net_raw;
diff --git a/sepolicy/rild.te b/sepolicy/rild.te
deleted file mode 100644
index 97e582b..0000000
--- a/sepolicy/rild.te
+++ /dev/null
@@ -1,7 +0,0 @@
-allow rild nv_data_file:dir rw_dir_perms;
-allow rild nv_data_file:file create_file_perms;
-allow rild diag_prop:property_service set;
-allow rild diag_device:chr_file { read write };
-get_prop(rild, diag_prop);
-allow rild diag_device:chr_file open;
-allow rild diag_device:chr_file ioctl;
diff --git a/sepolicy/rmt_storage.te b/sepolicy/rmt_storage.te
deleted file mode 100644
index a89459d..0000000
--- a/sepolicy/rmt_storage.te
+++ /dev/null
@@ -1 +0,0 @@
-allow rmt_storage self:capability net_raw;
diff --git a/sepolicy/sdcardd.te b/sepolicy/sdcardd.te
deleted file mode 100644
index 0f4c71d..0000000
--- a/sepolicy/sdcardd.te
+++ /dev/null
@@ -1 +0,0 @@
-allow sdcardd userdata_block_device:blk_file r_file_perms;
diff --git a/sepolicy/sensors.te b/sepolicy/sensors.te
deleted file mode 100644
index 899c77b..0000000
--- a/sepolicy/sensors.te
+++ /dev/null
@@ -1,4 +0,0 @@
-set_prop(sensors, diag_prop)
-allow sensors diag_device:chr_file { read write };
-allow sensors diag_device:chr_file open;
-allow sensors diag_device:chr_file ioctl;
diff --git a/sepolicy/shell.te b/sepolicy/shell.te
deleted file mode 100644
index 7fea463..0000000
--- a/sepolicy/shell.te
+++ /dev/null
@@ -1,4 +0,0 @@
-allow shell rfs_system_file:dir getattr;
-allow shell proc_stat:file read;
-allow shell su_exec:file getattr;
-
diff --git a/sepolicy/surfaceflinger.te b/sepolicy/surfaceflinger.te
deleted file mode 100644
index 1b654f0..0000000
--- a/sepolicy/surfaceflinger.te
+++ /dev/null
@@ -1,4 +0,0 @@
-get_prop(surfaceflinger, diag_prop);
-allow surfaceflinger diag_device:chr_file { read write };
-allow surfaceflinger diag_device:chr_file open;
-allow surfaceflinger diag_device:chr_file ioctl;
diff --git a/sepolicy/sysinit.te b/sepolicy/sysinit.te
deleted file mode 100644
index 8c9fb98..0000000
--- a/sepolicy/sysinit.te
+++ /dev/null
@@ -1,17 +0,0 @@
-type sysinit, domain;
-allow sysinit adsprpcd_file:dir getattr;
-allow sysinit cache_file:dir getattr;
-allow sysinit proc:file write;
-allow sysinit proc_dirty_ratio:file write;
-allow sysinit self:capability { dac_override dac_read_search };
-allow sysinit storage_file:dir getattr;
-allow sysinit system_block_device:blk_file read;
-allow sysinit proc:file open;
-allow sysinit proc_dirty_ratio:file open;
-allow sysinit system_block_device:blk_file open;
-allow sysinit proc:file read;
-allow sysinit proc_dirty_ratio:file read;
-allow sysinit system_block_device:blk_file ioctl;
-allow sysinit proc:file getattr;
-allow sysinit proc_dirty_ratio:file getattr;
-allow sysinit self:capability sys_admin;
diff --git a/sepolicy/system_app.te b/sepolicy/system_app.te
deleted file mode 100644
index f9df2ec..0000000
--- a/sepolicy/system_app.te
+++ /dev/null
@@ -1,4 +0,0 @@
-allow system_app proc_touchpanel:dir search;
-allow system_app proc_touchpanel:file rw_file_perms;
-
-allow system_app sysfs_fpc_proximity:file rw_file_perms;
diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te
deleted file mode 100644
index 64cdc0a..0000000
--- a/sepolicy/system_server.te
+++ /dev/null
@@ -1,21 +0,0 @@
-allow system_server persist_file:dir { read write };
-allow system_server proc_touchpanel:dir search;
-allow system_server proc_touchpanel:file rw_file_perms;
-allow system_server sensors_persist_file:file r_file_perms;
-allow system_server sensors_persist_file:dir search;
-allow system_server proc_stat:file r_file_perms;
-allow system_server unlabeled:file unlink;
-allow system_server sysfs_fpc_utouch_disable:file rw_file_perms;
-get_prop(system_server, diag_prop);
-allow system_server diag_device:chr_file { read write };
-allow system_server drmserver:process setsched;
-allow system_server keystore:process setsched;
-allow system_server mediacodec:process setsched;
-allow system_server mediadrmserver:process setsched;
-allow system_server mediaextractor:process setsched;
-allow system_server sdcardd:process setsched;
-allow system_server vold:process setsched;
-allow system_server zygote:process setsched;
-allow system_server diag_device:chr_file open;
-allow system_server diag_device:chr_file ioctl;
-allow system_server kernel:system syslog_read;
diff --git a/sepolicy/thermal-engine.te b/sepolicy/thermal-engine.te
deleted file mode 100644
index 7565599..0000000
--- a/sepolicy/thermal-engine.te
+++ /dev/null
@@ -1,9 +0,0 @@
-type_transition thermal-engine system_data_file:file thermal_data_file "decrypt.txt";
-allow thermal-engine sysfs_kgsl:file r_file_perms;
-allow thermal-engine system_data_file:dir w_dir_perms;
-allow thermal-engine thermal_data_file:file create_file_perms;
-allow thermal-engine sysfs_usb_supply:dir search;
-allow thermal-engine sysfs_usb_supply:file r_file_perms;
-allow thermal-engine diag_device:chr_file { read write };
-allow thermal-engine diag_device:chr_file open;
-allow thermal-engine diag_device:chr_file ioctl;
diff --git a/sepolicy/time_daemon.te b/sepolicy/time_daemon.te
deleted file mode 100644
index 53503d9..0000000
--- a/sepolicy/time_daemon.te
+++ /dev/null
@@ -1,5 +0,0 @@
-allow time_daemon property_socket:sock_file write;
-get_prop(time_daemon, diag_prop);
-allow time_daemon diag_device:chr_file { read write };
-allow time_daemon diag_device:chr_file open;
-allow time_daemon diag_device:chr_file ioctl;
diff --git a/sepolicy/ueventd.te b/sepolicy/ueventd.te
deleted file mode 100644
index ea55aa4..0000000
--- a/sepolicy/ueventd.te
+++ /dev/null
@@ -1 +0,0 @@
-allow ueventd vfat:file { read open };
diff --git a/sepolicy/uncrypt.te b/sepolicy/uncrypt.te
deleted file mode 100644
index 3b93052..0000000
--- a/sepolicy/uncrypt.te
+++ /dev/null
@@ -1,2 +0,0 @@
-allow uncrypt device:dir write;
-allow uncrypt kmsg_device:chr_file { open write };
diff --git a/sepolicy/untrusted_app.te b/sepolicy/untrusted_app.te
deleted file mode 100644
index 421d15e..0000000
--- a/sepolicy/untrusted_app.te
+++ /dev/null
@@ -1 +0,0 @@
-allow untrusted_app proc_stat:file r_file_perms;
diff --git a/sepolicy/vold.te b/sepolicy/vold.te
deleted file mode 100644
index be2bf87..0000000
--- a/sepolicy/vold.te
+++ /dev/null
@@ -1,2 +0,0 @@
-allow vold proc_touchpanel:dir r_dir_perms;
-allow vold system_block_device:blk_file getattr;
diff --git a/sepolicy/wcnss_filter.te b/sepolicy/wcnss_filter.te
deleted file mode 100644
index 7de2b1c..0000000
--- a/sepolicy/wcnss_filter.te
+++ /dev/null
@@ -1,2 +0,0 @@
-get_prop(wcnss_filter, diag_prop);
-allow wcnss_filter diag_device:chr_file { ioctl open read write };
diff --git a/sepolicy/wcnss_service.te b/sepolicy/wcnss_service.te
deleted file mode 100644
index 9aeca15..0000000
--- a/sepolicy/wcnss_service.te
+++ /dev/null
@@ -1,14 +0,0 @@
-allow wcnss_service self:capability {
- setgid
- setuid
- dac_override
- net_raw
-};
-r_dir_file(wcnss_service, sdcardfs);
-r_dir_file(wcnss_service, media_rw_data_file);
-allow wcnss_service sdcardfs:file append;
-allow wcnss_service media_rw_data_file:file append;
-get_prop(wcnss_service, diag_prop);
-allow wcnss_service diag_device:chr_file { read write };
-allow wcnss_service diag_device:chr_file open;
-allow wcnss_service diag_device:chr_file ioctl;
diff --git a/sepolicy/zygote.te b/sepolicy/zygote.te
deleted file mode 100644
index cb230af..0000000
--- a/sepolicy/zygote.te
+++ /dev/null
@@ -1,3 +0,0 @@
-allow zygote input_device:dir r_dir_perms;
-allow zygote input_device:chr_file rw_file_perms;
-allow zygote self:capability sys_nice;