remove un-reviewable sepolicy
Bug: 196916111 Test: boot to home Change-Id: Idac79eece3a2e36eca8ad1b1e0ffc8d771f445d3
This commit is contained in:
parent
ad68e7dc96
commit
8c532b1a65
5 changed files with 0 additions and 44 deletions
|
@ -1,3 +0,0 @@
|
|||
# Access to /sys/devices/platform/14700000.ufs/*
|
||||
allow hal_health_storage_default sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms;
|
|
@ -1,9 +0,0 @@
|
|||
allow kernel vendor_fw_file:dir search;
|
||||
allow kernel vendor_fw_file:file r_file_perms;
|
||||
|
||||
# ZRam
|
||||
allow kernel per_boot_file:file r_file_perms;
|
||||
|
||||
# memlat needs permision to create/delete perf events when hotplug on/off
|
||||
allow kernel self:capability2 perfmon;
|
||||
allow kernel self:perf_event cpu;
|
|
@ -1,20 +0,0 @@
|
|||
binder_call(platform_app, rild)
|
||||
allow platform_app hal_exynos_rild_hwservice:hwservice_manager find;
|
||||
|
||||
allow platform_app nfc_service:service_manager find;
|
||||
allow platform_app uwb_service:service_manager find;
|
||||
|
||||
allow platform_app fwk_stats_service:service_manager find;
|
||||
binder_use(platform_app)
|
||||
|
||||
allow platform_app touch_context_service:service_manager find;
|
||||
|
||||
# Fingerprint (UDFPS) GHBM/LHBM toggle
|
||||
get_prop(platform_app, fingerprint_ghbm_prop)
|
||||
|
||||
# TODO(b/184768835): remove this once the bug is fixed
|
||||
# Fingerprint (UDFPS) LHBM access
|
||||
userdebug_or_eng(`
|
||||
allow platform_app sysfs_leds:dir search;
|
||||
allow platform_app sysfs_lhbm:file rw_file_perms;
|
||||
')
|
|
@ -1,9 +0,0 @@
|
|||
# Allows privileged applications to discover the EdgeTPU service.
|
||||
allow priv_app edgetpu_app_service:service_manager find;
|
||||
|
||||
# Allows privileged applications to discover the NNAPI TPU service.
|
||||
allow priv_app edgetpu_nnapi_service:service_manager find;
|
||||
|
||||
# Allows privileged applications to access the EdgeTPU device, except open,
|
||||
# which is guarded by the EdgeTPU service.
|
||||
allow priv_app edgetpu_device:chr_file { getattr read write ioctl map };
|
|
@ -1,3 +0,0 @@
|
|||
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
|
||||
# for secure video playback
|
||||
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
Loading…
Add table
Add a link
Reference in a new issue