sdm660-common: sepolicy: Clean up sepolicy rules
Change-Id: I9d7312e6aaafdde2c0751f4887f05d8d5029ee04
This commit is contained in:
parent
eb97b49f0c
commit
8d789ade9f
11 changed files with 2 additions and 16 deletions
1
sepolicy/vendor/file_contexts
vendored
1
sepolicy/vendor/file_contexts
vendored
|
@ -16,7 +16,6 @@
|
|||
/sys/devices/soc/soc:fpc1020(/.*)? u:object_r:fingerprint_sysfs:s0
|
||||
/sys/bus/platform/devices/soc:fingerprint_fpc(/.*)? u:object_r:fingerprint_sysfs:s0
|
||||
|
||||
|
||||
# Hall Switch
|
||||
/sys/module/hall/parameters(/.*)? u:object_r:hall_dev:s0
|
||||
|
||||
|
|
1
sepolicy/vendor/hal_cas_default.te
vendored
1
sepolicy/vendor/hal_cas_default.te
vendored
|
@ -1 +0,0 @@
|
|||
vndbinder_use(hal_cas_default)
|
1
sepolicy/vendor/hal_fingerprint_sdm660.te
vendored
1
sepolicy/vendor/hal_fingerprint_sdm660.te
vendored
|
@ -20,6 +20,7 @@ allow hal_fingerprint_sdm660 fingerprintd_data_file:file create_file_perms;
|
|||
allow hal_fingerprint_sdm660 fingerprint_data_file:file rw_file_perms;
|
||||
|
||||
allow hal_fingerprint_sdm660 fingerprint_sysfs:file rw_file_perms;
|
||||
allow hal_fingerprint_sdm660 fingerprint_sysfs:dir r_dir_perms;
|
||||
|
||||
allow hal_fingerprint_sdm660 hal_perf_hwservice:hwservice_manager find;
|
||||
allow hal_fingerprint_sdm660 rootfs:dir read;
|
||||
|
|
|
@ -1,2 +0,0 @@
|
|||
allow hal_graphics_composer_default sysfs_graphics:file r_file_perms;
|
||||
allow hal_graphics_composer_default sysfs_graphics:lnk_file read;
|
1
sepolicy/vendor/hal_perf_default.te
vendored
1
sepolicy/vendor/hal_perf_default.te
vendored
|
@ -1 +0,0 @@
|
|||
dontaudit hal_perf_default self:capability { dac_override dac_read_search };
|
1
sepolicy/vendor/hvdcp.te
vendored
1
sepolicy/vendor/hvdcp.te
vendored
|
@ -1 +0,0 @@
|
|||
allow hvdcp sysfs:file { open read };
|
1
sepolicy/vendor/location.te
vendored
1
sepolicy/vendor/location.te
vendored
|
@ -1 +0,0 @@
|
|||
allow location sysfs:file { read open };
|
1
sepolicy/vendor/netmgrd.te
vendored
1
sepolicy/vendor/netmgrd.te
vendored
|
@ -1 +0,0 @@
|
|||
allow netmgrd property_socket:sock_file write;
|
2
sepolicy/vendor/system_server.te
vendored
2
sepolicy/vendor/system_server.te
vendored
|
@ -5,4 +5,4 @@ allow system_server sysfs_rtc:file r_file_perms;
|
|||
allow system_server vendor_camera_prop:file { getattr open read };
|
||||
allow system_server vendor_default_prop:file { getattr open read };
|
||||
allow system_server thermal_service:service_manager find;
|
||||
allow system_server sysfs_battery_supply:file { getattr open read write };
|
||||
allow system_server sysfs_battery_supply:file rw_file_perms;
|
||||
|
|
4
sepolicy/vendor/thermal-engine.te
vendored
4
sepolicy/vendor/thermal-engine.te
vendored
|
@ -6,8 +6,4 @@ allow thermal-engine property_socket:sock_file write;
|
|||
dontaudit thermal-engine self:capability dac_override;
|
||||
|
||||
set_prop(thermal-engine, thermal_engine_prop);
|
||||
|
||||
r_dir_file(thermal-engine sysfs_devfreq)
|
||||
r_dir_file(thermal-engine sysfs_graphics)
|
||||
r_dir_file(thermal-engine sysfs_thermal)
|
||||
dontaudit thermal-engine sysfs:dir read;
|
||||
|
|
3
sepolicy/vendor/vndservicemanager.te
vendored
3
sepolicy/vendor/vndservicemanager.te
vendored
|
@ -1,3 +0,0 @@
|
|||
allow vndservicemanager hal_fingerprint_default:dir { search read open };
|
||||
allow vndservicemanager hal_fingerprint_default:file { read open };
|
||||
allow vndservicemanager hal_fingerprint_default:process getattr;
|
Loading…
Reference in a new issue