aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--sepolicy/dashd.te46
1 files changed, 0 insertions, 46 deletions
diff --git a/sepolicy/dashd.te b/sepolicy/dashd.te
deleted file mode 100644
index 41525dd..0000000
--- a/sepolicy/dashd.te
+++ /dev/null
@@ -1,46 +0,0 @@
-# dash daemon
-
-# dashd seclabel is specified in init.rc since
-# it lives in the rootfs and has no unique file type.
-type dashd, domain;
-
-# Write to /dev/kmsg
-allow dashd kmsg_device:chr_file rw_file_perms;
-
-allow dashd self:capability { net_admin sys_tty_config };
-wakelock_use(dashd)
-allow dashd self:netlink_kobject_uevent_socket create_socket_perms;
-binder_use(dashd)
-binder_service(dashd)
-binder_call(dashd, system_server)
-
-# Write to state file.
-allow dashd sysfs:file write;
-
-###
-### dashd: charger mode
-###
-
-# Read /sys/fs/pstore/console-ramoops
-# Don't worry about overly broad permissions for now, as there's
-# only one file in /sys/fs/pstore
-allow dashd pstorefs:dir r_dir_perms;
-allow dashd pstorefs:file r_file_perms;
-
-allow dashd graphics_device:dir r_dir_perms;
-allow dashd graphics_device:chr_file rw_file_perms;
-allow dashd input_device:dir r_dir_perms;
-allow dashd input_device:chr_file rw_file_perms;
-allow dashd tty_device:chr_file rw_file_perms;
-allow dashd ashmem_device:chr_file execute;
-allow dashd self:process execmem;
-allow dashd proc_sysrq:file rw_file_perms;
-allow dashd self:capability { sys_boot dac_override};
-allow dashd device:dir { open read write } ;
-#allow dashd device:chr_file { write read };
-
-allow dashd proc_stat:file r_file_perms;
-allow dashd sysfs_batteryinfo:file r_file_perms;
-
-r_dir_file(dashd, sysfs_usb_supply);
-r_dir_file(dashd, sysfs_battery_supply);