diff options
-rw-r--r-- | sepolicy/dashd.te | 46 |
1 files changed, 0 insertions, 46 deletions
diff --git a/sepolicy/dashd.te b/sepolicy/dashd.te deleted file mode 100644 index 41525dd..0000000 --- a/sepolicy/dashd.te +++ /dev/null @@ -1,46 +0,0 @@ -# dash daemon - -# dashd seclabel is specified in init.rc since -# it lives in the rootfs and has no unique file type. -type dashd, domain; - -# Write to /dev/kmsg -allow dashd kmsg_device:chr_file rw_file_perms; - -allow dashd self:capability { net_admin sys_tty_config }; -wakelock_use(dashd) -allow dashd self:netlink_kobject_uevent_socket create_socket_perms; -binder_use(dashd) -binder_service(dashd) -binder_call(dashd, system_server) - -# Write to state file. -allow dashd sysfs:file write; - -### -### dashd: charger mode -### - -# Read /sys/fs/pstore/console-ramoops -# Don't worry about overly broad permissions for now, as there's -# only one file in /sys/fs/pstore -allow dashd pstorefs:dir r_dir_perms; -allow dashd pstorefs:file r_file_perms; - -allow dashd graphics_device:dir r_dir_perms; -allow dashd graphics_device:chr_file rw_file_perms; -allow dashd input_device:dir r_dir_perms; -allow dashd input_device:chr_file rw_file_perms; -allow dashd tty_device:chr_file rw_file_perms; -allow dashd ashmem_device:chr_file execute; -allow dashd self:process execmem; -allow dashd proc_sysrq:file rw_file_perms; -allow dashd self:capability { sys_boot dac_override}; -allow dashd device:dir { open read write } ; -#allow dashd device:chr_file { write read }; - -allow dashd proc_stat:file r_file_perms; -allow dashd sysfs_batteryinfo:file r_file_perms; - -r_dir_file(dashd, sysfs_usb_supply); -r_dir_file(dashd, sysfs_battery_supply); |