Merge "Remove sced sepolicy rule" into main
This commit is contained in:
commit
ccf51fc02b
4 changed files with 0 additions and 27 deletions
1
whitechapel/vendor/google/file.te
vendored
1
whitechapel/vendor/google/file.te
vendored
|
@ -9,7 +9,6 @@ type vendor_dmd_log_file, file_type, data_file_type;
|
|||
type vendor_rfsd_log_file, file_type, data_file_type;
|
||||
type vendor_dump_log_file, file_type, data_file_type;
|
||||
type vendor_rild_log_file, file_type, data_file_type;
|
||||
type vendor_sced_log_file, file_type, data_file_type;
|
||||
type vendor_telephony_log_file, file_type, data_file_type;
|
||||
|
||||
# app data files
|
||||
|
|
2
whitechapel/vendor/google/file_contexts
vendored
2
whitechapel/vendor/google/file_contexts
vendored
|
@ -136,7 +136,6 @@
|
|||
/(vendor|system/vendor)/bin/cbd u:object_r:cbd_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/rild_exynos u:object_r:rild_exec:s0
|
||||
/(vendor|system/vendor)/bin/rfsd u:object_r:rfsd_exec:s0
|
||||
/(vendor|system/vendor)/bin/sced u:object_r:sced_exec:s0
|
||||
/(vendor|system/vendor)/bin/bipchmgr u:object_r:bipchmgr_exec:s0
|
||||
|
||||
#
|
||||
|
@ -148,7 +147,6 @@
|
|||
/data/vendor/log/rfsd(/.*)? u:object_r:vendor_rfsd_log_file:s0
|
||||
/data/vendor/log/dump(/.*)? u:object_r:vendor_dump_log_file:s0
|
||||
/data/vendor/log/rild(/.*)? u:object_r:vendor_rild_log_file:s0
|
||||
/data/vendor/log/sced(/.*)? u:object_r:vendor_sced_log_file:s0
|
||||
|
||||
/persist/sensorcal\.json u:object_r:sensors_cal_file:s0
|
||||
|
||||
|
|
23
whitechapel/vendor/google/sced.te
vendored
23
whitechapel/vendor/google/sced.te
vendored
|
@ -1,23 +0,0 @@
|
|||
type sced, domain;
|
||||
type sced_exec, vendor_file_type, exec_type, file_type;
|
||||
init_daemon_domain(sced)
|
||||
|
||||
userdebug_or_eng(`
|
||||
typeattribute sced vendor_executes_system_violators;
|
||||
|
||||
hwbinder_use(sced)
|
||||
binder_call(sced, dmd)
|
||||
binder_call(sced, vendor_telephony_app)
|
||||
|
||||
get_prop(sced, hwservicemanager_prop)
|
||||
allow sced self:packet_socket create_socket_perms_no_ioctl;
|
||||
|
||||
allow sced self:capability net_raw;
|
||||
allow sced shell_exec:file rx_file_perms;
|
||||
allow sced tcpdump_exec:file rx_file_perms;
|
||||
allow sced vendor_shell_exec:file x_file_perms;
|
||||
allow sced vendor_slog_file:dir create_dir_perms;
|
||||
allow sced vendor_slog_file:file create_file_perms;
|
||||
allow sced hidl_base_hwservice:hwservice_manager add;
|
||||
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
|
||||
')
|
|
@ -12,7 +12,6 @@ allow vendor_telephony_app vendor_slog_file:file create_file_perms;
|
|||
allow vendor_telephony_app app_api_service:service_manager find;
|
||||
allow vendor_telephony_app hal_vendor_oem_hwservice:hwservice_manager find;
|
||||
binder_call(vendor_telephony_app, dmd)
|
||||
binder_call(vendor_telephony_app, sced)
|
||||
|
||||
userdebug_or_eng(`
|
||||
# Silent Logging
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue