diff options
author | dd3boh <dade.garberi@gmail.com> | 2017-11-03 16:53:27 +0100 |
---|---|---|
committer | dd3boh <dade.garberi@gmail.com> | 2017-11-04 18:37:15 +0100 |
commit | 1acb2b3f27520dc7d1dafee850bbc5e2562b3cf4 (patch) | |
tree | b964a66805ef2473905d2c82f5ea7aadfd10c70a | |
parent | a18ae7d8278f9be32946f3f67dbf0c49add82b31 (diff) |
msm8996-common: Nuke the Nougat sepolicy
Signed-off-by: dd3boh <dade.garberi@gmail.com>
53 files changed, 0 insertions, 281 deletions
diff --git a/sepolicy/audioserver.te b/sepolicy/audioserver.te deleted file mode 100644 index 65a6bf3..0000000 --- a/sepolicy/audioserver.te +++ /dev/null @@ -1,4 +0,0 @@ -set_prop(audioserver, diag_prop); -allow audioserver diag_device:chr_file { read write }; -allow audioserver diag_device:chr_file open; -allow audioserver diag_device:chr_file ioctl; diff --git a/sepolicy/bootstat.te b/sepolicy/bootstat.te deleted file mode 100644 index ffe9fc3..0000000 --- a/sepolicy/bootstat.te +++ /dev/null @@ -1 +0,0 @@ -allow bootstat rootfs:lnk_file { getattr }; diff --git a/sepolicy/charger_monitor.te b/sepolicy/charger_monitor.te deleted file mode 100644 index f658037..0000000 --- a/sepolicy/charger_monitor.te +++ /dev/null @@ -1,3 +0,0 @@ -# DASH -allow healthd healthd:capability { dac_override dac_read_search }; -allow healthd device:dir read; diff --git a/sepolicy/cnd.te b/sepolicy/cnd.te deleted file mode 100644 index 654dece..0000000 --- a/sepolicy/cnd.te +++ /dev/null @@ -1,5 +0,0 @@ -allow cnd diag_prop:property_service set; -get_prop(cnd, diag_prop); -allow cnd diag_device:chr_file { read write }; -allow cnd diag_device:chr_file open; -allow cnd diag_device:chr_file ioctl; diff --git a/sepolicy/dataservice_app.te b/sepolicy/dataservice_app.te deleted file mode 100644 index 919f269..0000000 --- a/sepolicy/dataservice_app.te +++ /dev/null @@ -1 +0,0 @@ -set_prop(dataservice_app, diag_prop); diff --git a/sepolicy/debuggerd.te b/sepolicy/debuggerd.te deleted file mode 100644 index 974c172..0000000 --- a/sepolicy/debuggerd.te +++ /dev/null @@ -1 +0,0 @@ -allow debuggerd app_data_file:dir search; diff --git a/sepolicy/device.te b/sepolicy/device.te deleted file mode 100644 index e271129..0000000 --- a/sepolicy/device.te +++ /dev/null @@ -1 +0,0 @@ -type fpc1020_device, dev_type; diff --git a/sepolicy/dpmd.te b/sepolicy/dpmd.te deleted file mode 100644 index 5a47688..0000000 --- a/sepolicy/dpmd.te +++ /dev/null @@ -1,4 +0,0 @@ -get_prop(dpmd, diag_prop); -allow dpmd diag_device:chr_file { read write }; -allow dpmd diag_device:chr_file open; -allow dpmd diag_device:chr_file ioctl; diff --git a/sepolicy/energyawareness.te b/sepolicy/energyawareness.te deleted file mode 100644 index 4cde0c1..0000000 --- a/sepolicy/energyawareness.te +++ /dev/null @@ -1,2 +0,0 @@ -allow energyawareness debugfs_msm_core:file rw_file_perms; -allow energyawareness debugfs_msm_core:dir r_dir_perms; diff --git a/sepolicy/file.te b/sepolicy/file.te deleted file mode 100644 index 1ba40c1..0000000 --- a/sepolicy/file.te +++ /dev/null @@ -1,12 +0,0 @@ -type fpc_data_file, file_type; -type fpc_images_file, file_type; -type sysfs_fpc_irq, sysfs_type, fs_type; -type sysfs_fpc_proximity, sysfs_type, fs_type; -type sysfs_fpc_utouch_disable, fs_type, sysfs_type; -type proc_touchpanel, fs_type; -type nv_data_file, file_type; -type proc_stat, fs_type; -type debugfs_msm_core, debugfs_type, fs_type; -type debugfs_rmts, debugfs_type, fs_type; -type thermal_data_file, file_type; -type netmgrd_data_file, file_type; diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts deleted file mode 100644 index 979f833..0000000 --- a/sepolicy/file_contexts +++ /dev/null @@ -1,35 +0,0 @@ -# We have a couple of non-standard NV partitions -/dev/block/bootdevice/by-name/oem_dycnvbk u:object_r:modem_efs_partition_device:s0 -/dev/block/bootdevice/by-name/oem_stanvbk u:object_r:modem_efs_partition_device:s0 - -# FRP partition -/dev/block/bootdevice/by-name/config u:object_r:frp_block_device:s0 - -/persist/sensors/gyro_sensitity_cal u:object_r:sensors_persist_file:s0 - -/data/oemnvitems(/.*)? u:object_r:nv_data_file:s0 - -/dev/fpc1020 u:object_r:fpc1020_device:s0 -/data/fpc(/.*)? u:object_r:fpc_data_file:s0 -/data/fpc_images(/.*)? u:object_r:fpc_images_file:s0 -/sys/devices/soc/soc:fpc_fpc1020/irq u:object_r:sysfs_fpc_irq:s0 -/sys/devices/soc/soc:fpc_fpc1020/proximity_state u:object_r:sysfs_fpc_proximity:s0 -/sys/devices/soc/soc:fpc1020/utouch_disable u:object_r:sysfs_fpc_utouch_disable:s0 - -/dev/dash u:object_r:input_device:s0 -/sys/devices/soc/.*ssusb/power_supply/usb(/.*)? u:object_r:sysfs_usb_supply:s0 - -/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/capacity u:object_r:sysfs_batteryinfo:s0 -/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/current_now u:object_r:sysfs_batteryinfo:s0 -/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/voltage_now u:object_r:sysfs_batteryinfo:s0 -/sys/devices/soc/qpnp-smbcharger-[0-9a-f]+/power_supply/battery/temp u:object_r:sysfs_batteryinfo:s0 - -/sys/kernel/debug/msm_core(/.*)? u:object_r:debugfs_msm_core:s0 - -/sys/kernel/debug/rmt_storage/rmts u:object_r:debugfs_rmts:s0 - -/system/bin/readmac u:object_r:readmac_exec:s0 - -# Data files -/data/decrypt.txt u:object_r:thermal_data_file:s0 -/data/misc/netmgr/log.txt u:object_r:netmgrd_data_file:s0 diff --git a/sepolicy/fingerprintd.te b/sepolicy/fingerprintd.te deleted file mode 100644 index 0a693bf..0000000 --- a/sepolicy/fingerprintd.te +++ /dev/null @@ -1,16 +0,0 @@ -r_dir_file(fingerprintd, firmware_file) -r_dir_file(fingerprintd, proc_touchpanel) -allow fingerprintd fpc_data_file:dir rw_dir_perms; -allow fingerprintd fpc_data_file:sock_file { create unlink setattr }; -allow fingerprintd fpc_images_file:dir rw_dir_perms; -allow fingerprintd fpc_images_file:file create_file_perms; -allow fingerprintd sysfs_fpc_irq:file rw_file_perms; -allow fingerprintd tee_device:chr_file rw_file_perms; -allow fingerprintd sysfs:file write; -allow fingerprintd vfat:file r_file_perms; -allow fingerprintd system_data_file:dir { read write }; -allow fingerprintd system_data_file:dir { open remove_name }; -allow fingerprintd system_data_file:sock_file unlink; -allow fingerprintd system_data_file:dir add_name; -allow fingerprintd system_data_file:sock_file create; -allow fingerprintd system_data_file:sock_file setattr; diff --git a/sepolicy/genfs_contexts b/sepolicy/genfs_contexts deleted file mode 100644 index a4d53e1..0000000 --- a/sepolicy/genfs_contexts +++ /dev/null @@ -1,4 +0,0 @@ -genfscon proc /touchpanel u:object_r:proc_touchpanel:s0 -genfscon proc /s1302 u:object_r:proc_touchpanel:s0 -genfscon proc /tri-state-key u:object_r:proc_touchpanel:s0 -genfscon proc /stat u:object_r:proc_stat:s0 diff --git a/sepolicy/hostapd.te b/sepolicy/hostapd.te deleted file mode 100644 index 27c06b6..0000000 --- a/sepolicy/hostapd.te +++ /dev/null @@ -1 +0,0 @@ -allow hostapd hostapd:chr_file { read write }; diff --git a/sepolicy/ims.te b/sepolicy/ims.te deleted file mode 100644 index 13f3f51..0000000 --- a/sepolicy/ims.te +++ /dev/null @@ -1,6 +0,0 @@ -allow ims diag_prop:property_service set; -allow ims self:capability net_raw; -get_prop(ims, diag_prop); -allow ims diag_device:chr_file { read write }; -allow ims diag_device:chr_file open; -allow ims diag_device:chr_file ioctl; diff --git a/sepolicy/init.te b/sepolicy/init.te deleted file mode 100644 index 23d7d46..0000000 --- a/sepolicy/init.te +++ /dev/null @@ -1,2 +0,0 @@ -allow init debugfs:file write; - diff --git a/sepolicy/ipacm-diag.te b/sepolicy/ipacm-diag.te deleted file mode 100644 index d81b682..0000000 --- a/sepolicy/ipacm-diag.te +++ /dev/null @@ -1,5 +0,0 @@ -set_prop(ipacm-diag, diag_prop) -set_prop(ipacm-diag, system_prop) -allow ipacm-diag diag_device:chr_file { read write }; -allow ipacm-diag diag_device:chr_file open; -allow ipacm-diag diag_device:chr_file ioctl; diff --git a/sepolicy/kernel.te b/sepolicy/kernel.te deleted file mode 100644 index 70a2ac8..0000000 --- a/sepolicy/kernel.te +++ /dev/null @@ -1,3 +0,0 @@ -allow kernel vfat:file open; -allow kernel self:capability { dac_read_search dac_override }; -allow kernel self:socket create; diff --git a/sepolicy/location.te b/sepolicy/location.te deleted file mode 100644 index 73d1f32..0000000 --- a/sepolicy/location.te +++ /dev/null @@ -1,4 +0,0 @@ -allow location permission_service:service_manager find; -allow location diag_device:chr_file { read write }; -allow location diag_device:chr_file open; -allow location diag_device:chr_file ioctl; diff --git a/sepolicy/log.te b/sepolicy/log.te deleted file mode 100644 index 6a1fe9f..0000000 --- a/sepolicy/log.te +++ /dev/null @@ -1,3 +0,0 @@ -allow logd unlabeled:dir search; -allow logd self:capability { dac_override dac_read_search }; - diff --git a/sepolicy/mediaserver.te b/sepolicy/mediaserver.te deleted file mode 100644 index 43c74fd..0000000 --- a/sepolicy/mediaserver.te +++ /dev/null @@ -1,6 +0,0 @@ -allow mediaserver audio_device:chr_file { ioctl open read write }; -allow mediaserver sensorservice_service:service_manager find; -allow mediaserver system_server:unix_stream_socket { read write }; -allow mediaserver camera_data_file:dir search; -allow mediaserver cameraproxy_service:service_manager find; -allow mediaserver cameraserver_service:service_manager add; diff --git a/sepolicy/mm-pp-daemon.te b/sepolicy/mm-pp-daemon.te deleted file mode 100644 index 4e4a21a..0000000 --- a/sepolicy/mm-pp-daemon.te +++ /dev/null @@ -1,4 +0,0 @@ -allow mm-pp-daemon diag_device:chr_file rw_file_perms; -allow mm-pp-daemon self:socket create_socket_perms; -r_dir_file(mm-pp-daemon, sensors_persist_file); -set_prop(mm-pp-daemon, diag_prop); diff --git a/sepolicy/mm-qcamerad.te b/sepolicy/mm-qcamerad.te deleted file mode 100644 index 58283b7..0000000 --- a/sepolicy/mm-qcamerad.te +++ /dev/null @@ -1,5 +0,0 @@ -allow mm-qcamerad camera_prop:property_service set; -allow mm-qcamerad permission_service:service_manager find; -allow mm-qcamerad mpctl_socket:sock_file write; -get_prop(mm-qcamerad, diag_prop); -unix_socket_connect(mm-qcamerad, mpctl, perfd) diff --git a/sepolicy/netd.te b/sepolicy/netd.te deleted file mode 100644 index f513b69..0000000 --- a/sepolicy/netd.te +++ /dev/null @@ -1,2 +0,0 @@ -r_dir_file(netd, firmware_file) -allow netd vfat:file r_file_perms; diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te deleted file mode 100644 index 81c6213..0000000 --- a/sepolicy/netmgrd.te +++ /dev/null @@ -1,6 +0,0 @@ -type_transition netmgrd system_data_file:file netmgrd_data_file "log.txt"; -allow netmgrd self:capability dac_override; -allow netmgrd netmgrd_data_file:file rw_file_perms; -allow netmgrd diag_device:chr_file { read write }; -allow netmgrd diag_device:chr_file open; -allow netmgrd diag_device:chr_file ioctl; diff --git a/sepolicy/per_mgr.te b/sepolicy/per_mgr.te deleted file mode 100644 index c964ad3..0000000 --- a/sepolicy/per_mgr.te +++ /dev/null @@ -1 +0,0 @@ -allow per_mgr vfat:file r_file_perms; diff --git a/sepolicy/perfd.te b/sepolicy/perfd.te deleted file mode 100644 index 458f70f..0000000 --- a/sepolicy/perfd.te +++ /dev/null @@ -1 +0,0 @@ -allow perfd system_server:file write; diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te deleted file mode 100644 index 72e3223..0000000 --- a/sepolicy/priv_app.te +++ /dev/null @@ -1,2 +0,0 @@ -allow priv_app device:dir r_dir_perms; -allow priv_app rfs_system_file:dir r_dir_perms; diff --git a/sepolicy/property.te b/sepolicy/property.te deleted file mode 100644 index 85dcb78..0000000 --- a/sepolicy/property.te +++ /dev/null @@ -1 +0,0 @@ -type diag_prop, property_type; diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts deleted file mode 100644 index d9ba461..0000000 --- a/sepolicy/property_contexts +++ /dev/null @@ -1,6 +0,0 @@ -service.soundcard. u:object_r:audio_prop:s0 -audio. u:object_r:audio_prop:s0 -ro.sys.oem.sno u:object_r:system_radio_prop:s0 -sys.fake_bs_flag0 u:object_r:system_radio_prop:s0 -sys.fake_bs_flag1 u:object_r:system_radio_prop:s0 - diff --git a/sepolicy/qmuxd.te b/sepolicy/qmuxd.te deleted file mode 100644 index c0a40f4..0000000 --- a/sepolicy/qmuxd.te +++ /dev/null @@ -1,4 +0,0 @@ -set_prop(qmuxd, diag_prop) -allow qmuxd diag_device:chr_file { read write }; -allow qmuxd diag_device:chr_file open; -allow qmuxd diag_device:chr_file ioctl; diff --git a/sepolicy/qti.te b/sepolicy/qti.te deleted file mode 100644 index 172211a..0000000 --- a/sepolicy/qti.te +++ /dev/null @@ -1,4 +0,0 @@ -set_prop(qti, diag_prop) -allow qti diag_device:chr_file { read write }; -allow qti diag_device:chr_file open; -allow qti diag_device:chr_file ioctl; diff --git a/sepolicy/qti_init_shell.te b/sepolicy/qti_init_shell.te deleted file mode 100644 index 52a3a9c..0000000 --- a/sepolicy/qti_init_shell.te +++ /dev/null @@ -1,5 +0,0 @@ -allow qti_init_shell kmsg_device:chr_file { write open }; -allow qti_init_shell diag_prop:property_service set; -allow qti_init_shell self:socket create_socket_perms; -allow qti_init_shell sysfs_devices_system_cpu:file { setattr }; -qmux_socket(qti_init_shell) diff --git a/sepolicy/readmac.te b/sepolicy/readmac.te deleted file mode 100644 index 23e5e9b..0000000 --- a/sepolicy/readmac.te +++ /dev/null @@ -1,18 +0,0 @@ -type readmac, domain; -type readmac_exec, exec_type, file_type; - -# Allow for transition from init domain to readmac -init_daemon_domain(readmac) - -# Allow readmac to communicate with qmuxd via qmux_radio socket -qmux_socket(readmac) - -# Allow readmac to fully access wlan_mac.bin persist file -allow readmac persist_file:dir rw_dir_perms; -allow readmac persist_file:file create_file_perms; - -allow readmac self:capability dac_override; -allow readmac self:socket create_socket_perms; - -allow readmac diag_device:chr_file rw_file_perms; -allow readmac sysfs:file r_file_perms; diff --git a/sepolicy/rfs_access.te b/sepolicy/rfs_access.te deleted file mode 100644 index f4264c9..0000000 --- a/sepolicy/rfs_access.te +++ /dev/null @@ -1 +0,0 @@ -allow rfs_access self:capability net_raw; diff --git a/sepolicy/rild.te b/sepolicy/rild.te deleted file mode 100644 index 97e582b..0000000 --- a/sepolicy/rild.te +++ /dev/null @@ -1,7 +0,0 @@ -allow rild nv_data_file:dir rw_dir_perms; -allow rild nv_data_file:file create_file_perms; -allow rild diag_prop:property_service set; -allow rild diag_device:chr_file { read write }; -get_prop(rild, diag_prop); -allow rild diag_device:chr_file open; -allow rild diag_device:chr_file ioctl; diff --git a/sepolicy/rmt_storage.te b/sepolicy/rmt_storage.te deleted file mode 100644 index a89459d..0000000 --- a/sepolicy/rmt_storage.te +++ /dev/null @@ -1 +0,0 @@ -allow rmt_storage self:capability net_raw; diff --git a/sepolicy/sdcardd.te b/sepolicy/sdcardd.te deleted file mode 100644 index 0f4c71d..0000000 --- a/sepolicy/sdcardd.te +++ /dev/null @@ -1 +0,0 @@ -allow sdcardd userdata_block_device:blk_file r_file_perms; diff --git a/sepolicy/sensors.te b/sepolicy/sensors.te deleted file mode 100644 index 899c77b..0000000 --- a/sepolicy/sensors.te +++ /dev/null @@ -1,4 +0,0 @@ -set_prop(sensors, diag_prop) -allow sensors diag_device:chr_file { read write }; -allow sensors diag_device:chr_file open; -allow sensors diag_device:chr_file ioctl; diff --git a/sepolicy/shell.te b/sepolicy/shell.te deleted file mode 100644 index 7fea463..0000000 --- a/sepolicy/shell.te +++ /dev/null @@ -1,4 +0,0 @@ -allow shell rfs_system_file:dir getattr; -allow shell proc_stat:file read; -allow shell su_exec:file getattr; - diff --git a/sepolicy/surfaceflinger.te b/sepolicy/surfaceflinger.te deleted file mode 100644 index 1b654f0..0000000 --- a/sepolicy/surfaceflinger.te +++ /dev/null @@ -1,4 +0,0 @@ -get_prop(surfaceflinger, diag_prop); -allow surfaceflinger diag_device:chr_file { read write }; -allow surfaceflinger diag_device:chr_file open; -allow surfaceflinger diag_device:chr_file ioctl; diff --git a/sepolicy/sysinit.te b/sepolicy/sysinit.te deleted file mode 100644 index 8c9fb98..0000000 --- a/sepolicy/sysinit.te +++ /dev/null @@ -1,17 +0,0 @@ -type sysinit, domain; -allow sysinit adsprpcd_file:dir getattr; -allow sysinit cache_file:dir getattr; -allow sysinit proc:file write; -allow sysinit proc_dirty_ratio:file write; -allow sysinit self:capability { dac_override dac_read_search }; -allow sysinit storage_file:dir getattr; -allow sysinit system_block_device:blk_file read; -allow sysinit proc:file open; -allow sysinit proc_dirty_ratio:file open; -allow sysinit system_block_device:blk_file open; -allow sysinit proc:file read; -allow sysinit proc_dirty_ratio:file read; -allow sysinit system_block_device:blk_file ioctl; -allow sysinit proc:file getattr; -allow sysinit proc_dirty_ratio:file getattr; -allow sysinit self:capability sys_admin; diff --git a/sepolicy/system_app.te b/sepolicy/system_app.te deleted file mode 100644 index f9df2ec..0000000 --- a/sepolicy/system_app.te +++ /dev/null @@ -1,4 +0,0 @@ -allow system_app proc_touchpanel:dir search; -allow system_app proc_touchpanel:file rw_file_perms; - -allow system_app sysfs_fpc_proximity:file rw_file_perms; diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te deleted file mode 100644 index 64cdc0a..0000000 --- a/sepolicy/system_server.te +++ /dev/null @@ -1,21 +0,0 @@ -allow system_server persist_file:dir { read write }; -allow system_server proc_touchpanel:dir search; -allow system_server proc_touchpanel:file rw_file_perms; -allow system_server sensors_persist_file:file r_file_perms; -allow system_server sensors_persist_file:dir search; -allow system_server proc_stat:file r_file_perms; -allow system_server unlabeled:file unlink; -allow system_server sysfs_fpc_utouch_disable:file rw_file_perms; -get_prop(system_server, diag_prop); -allow system_server diag_device:chr_file { read write }; -allow system_server drmserver:process setsched; -allow system_server keystore:process setsched; -allow system_server mediacodec:process setsched; -allow system_server mediadrmserver:process setsched; -allow system_server mediaextractor:process setsched; -allow system_server sdcardd:process setsched; -allow system_server vold:process setsched; -allow system_server zygote:process setsched; -allow system_server diag_device:chr_file open; -allow system_server diag_device:chr_file ioctl; -allow system_server kernel:system syslog_read; diff --git a/sepolicy/thermal-engine.te b/sepolicy/thermal-engine.te deleted file mode 100644 index 7565599..0000000 --- a/sepolicy/thermal-engine.te +++ /dev/null @@ -1,9 +0,0 @@ -type_transition thermal-engine system_data_file:file thermal_data_file "decrypt.txt"; -allow thermal-engine sysfs_kgsl:file r_file_perms; -allow thermal-engine system_data_file:dir w_dir_perms; -allow thermal-engine thermal_data_file:file create_file_perms; -allow thermal-engine sysfs_usb_supply:dir search; -allow thermal-engine sysfs_usb_supply:file r_file_perms; -allow thermal-engine diag_device:chr_file { read write }; -allow thermal-engine diag_device:chr_file open; -allow thermal-engine diag_device:chr_file ioctl; diff --git a/sepolicy/time_daemon.te b/sepolicy/time_daemon.te deleted file mode 100644 index 53503d9..0000000 --- a/sepolicy/time_daemon.te +++ /dev/null @@ -1,5 +0,0 @@ -allow time_daemon property_socket:sock_file write; -get_prop(time_daemon, diag_prop); -allow time_daemon diag_device:chr_file { read write }; -allow time_daemon diag_device:chr_file open; -allow time_daemon diag_device:chr_file ioctl; diff --git a/sepolicy/ueventd.te b/sepolicy/ueventd.te deleted file mode 100644 index ea55aa4..0000000 --- a/sepolicy/ueventd.te +++ /dev/null @@ -1 +0,0 @@ -allow ueventd vfat:file { read open }; diff --git a/sepolicy/uncrypt.te b/sepolicy/uncrypt.te deleted file mode 100644 index 3b93052..0000000 --- a/sepolicy/uncrypt.te +++ /dev/null @@ -1,2 +0,0 @@ -allow uncrypt device:dir write; -allow uncrypt kmsg_device:chr_file { open write }; diff --git a/sepolicy/untrusted_app.te b/sepolicy/untrusted_app.te deleted file mode 100644 index 421d15e..0000000 --- a/sepolicy/untrusted_app.te +++ /dev/null @@ -1 +0,0 @@ -allow untrusted_app proc_stat:file r_file_perms; diff --git a/sepolicy/vold.te b/sepolicy/vold.te deleted file mode 100644 index be2bf87..0000000 --- a/sepolicy/vold.te +++ /dev/null @@ -1,2 +0,0 @@ -allow vold proc_touchpanel:dir r_dir_perms; -allow vold system_block_device:blk_file getattr; diff --git a/sepolicy/wcnss_filter.te b/sepolicy/wcnss_filter.te deleted file mode 100644 index 7de2b1c..0000000 --- a/sepolicy/wcnss_filter.te +++ /dev/null @@ -1,2 +0,0 @@ -get_prop(wcnss_filter, diag_prop); -allow wcnss_filter diag_device:chr_file { ioctl open read write }; diff --git a/sepolicy/wcnss_service.te b/sepolicy/wcnss_service.te deleted file mode 100644 index 9aeca15..0000000 --- a/sepolicy/wcnss_service.te +++ /dev/null @@ -1,14 +0,0 @@ -allow wcnss_service self:capability { - setgid - setuid - dac_override - net_raw -}; -r_dir_file(wcnss_service, sdcardfs); -r_dir_file(wcnss_service, media_rw_data_file); -allow wcnss_service sdcardfs:file append; -allow wcnss_service media_rw_data_file:file append; -get_prop(wcnss_service, diag_prop); -allow wcnss_service diag_device:chr_file { read write }; -allow wcnss_service diag_device:chr_file open; -allow wcnss_service diag_device:chr_file ioctl; diff --git a/sepolicy/zygote.te b/sepolicy/zygote.te deleted file mode 100644 index cb230af..0000000 --- a/sepolicy/zygote.te +++ /dev/null @@ -1,3 +0,0 @@ -allow zygote input_device:dir r_dir_perms; -allow zygote input_device:chr_file rw_file_perms; -allow zygote self:capability sys_nice; |