From 3fdb24bdc19bd914dfab0f5120012e1f3c068232 Mon Sep 17 00:00:00 2001 From: Ray Chi Date: Tue, 29 Mar 2022 15:45:11 +0800 Subject: [PATCH] Revert "add sepolicy for set_usb_irq.sh" This reverts commit 6733f9667d6afe2dd3e62a33043493b58d6ca03b. Bug: 225789036 Test: build pass Change-Id: If43c8db71c737d509b1dfd098503f564a06bf046 --- whitechapel_pro/file_contexts | 4 ---- whitechapel_pro/set-usb-irq-sh.te | 13 ------------- 2 files changed, 17 deletions(-) delete mode 100644 whitechapel_pro/set-usb-irq-sh.te diff --git a/whitechapel_pro/file_contexts b/whitechapel_pro/file_contexts index 67ceea77..3b31f641 100644 --- a/whitechapel_pro/file_contexts +++ b/whitechapel_pro/file_contexts @@ -220,9 +220,5 @@ /mnt/vendor/efs_backup(/.*)? u:object_r:modem_efs_file:s0 /mnt/vendor/modem_userdata(/.*)? u:object_r:modem_userdata_file:s0 -# USB -/vendor/bin/hw/set_usb_irq\.sh u:object_r:set-usb-irq-sh_exec:s0 - # Raw HID device /dev/hidraw[0-9]* u:object_r:hidraw_device:s0 - diff --git a/whitechapel_pro/set-usb-irq-sh.te b/whitechapel_pro/set-usb-irq-sh.te deleted file mode 100644 index a00fe3bb..00000000 --- a/whitechapel_pro/set-usb-irq-sh.te +++ /dev/null @@ -1,13 +0,0 @@ -type set-usb-irq-sh, domain; -type set-usb-irq-sh_exec, vendor_file_type, exec_type, file_type; -init_daemon_domain(set-usb-irq-sh) - -allow set-usb-irq-sh vendor_toolbox_exec:file execute_no_trans; - -allow set-usb-irq-sh proc_irq:dir r_dir_perms; -allow set-usb-irq-sh proc_irq:file w_file_perms; - -# AFAICT this happens if /proc/irq updates as we're running -# and we end up trying to write into non-existing file, -# which implies creation... -dontaudit set-usb-irq-sh self:capability dac_override;