From 8c532b1a651d67f5a336538ca7772f312f42f1e7 Mon Sep 17 00:00:00 2001 From: Adam Shih Date: Mon, 27 Sep 2021 10:46:52 +0800 Subject: [PATCH] remove un-reviewable sepolicy Bug: 196916111 Test: boot to home Change-Id: Idac79eece3a2e36eca8ad1b1e0ffc8d771f445d3 --- legacy/hal_health_storage_default.te | 3 --- legacy/kernel.te | 9 --------- legacy/platform_app.te | 20 -------------------- legacy/priv_app.te | 9 --------- legacy/untrusted_app_all.te | 3 --- 5 files changed, 44 deletions(-) delete mode 100644 legacy/hal_health_storage_default.te delete mode 100644 legacy/kernel.te delete mode 100644 legacy/platform_app.te delete mode 100644 legacy/priv_app.te delete mode 100644 legacy/untrusted_app_all.te diff --git a/legacy/hal_health_storage_default.te b/legacy/hal_health_storage_default.te deleted file mode 100644 index 2aa0881e..00000000 --- a/legacy/hal_health_storage_default.te +++ /dev/null @@ -1,3 +0,0 @@ -# Access to /sys/devices/platform/14700000.ufs/* -allow hal_health_storage_default sysfs_scsi_devices_0000:dir r_dir_perms; -allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms; diff --git a/legacy/kernel.te b/legacy/kernel.te deleted file mode 100644 index 0156784e..00000000 --- a/legacy/kernel.te +++ /dev/null @@ -1,9 +0,0 @@ -allow kernel vendor_fw_file:dir search; -allow kernel vendor_fw_file:file r_file_perms; - -# ZRam -allow kernel per_boot_file:file r_file_perms; - -# memlat needs permision to create/delete perf events when hotplug on/off -allow kernel self:capability2 perfmon; -allow kernel self:perf_event cpu; diff --git a/legacy/platform_app.te b/legacy/platform_app.te deleted file mode 100644 index acff39cd..00000000 --- a/legacy/platform_app.te +++ /dev/null @@ -1,20 +0,0 @@ -binder_call(platform_app, rild) -allow platform_app hal_exynos_rild_hwservice:hwservice_manager find; - -allow platform_app nfc_service:service_manager find; -allow platform_app uwb_service:service_manager find; - -allow platform_app fwk_stats_service:service_manager find; -binder_use(platform_app) - -allow platform_app touch_context_service:service_manager find; - -# Fingerprint (UDFPS) GHBM/LHBM toggle -get_prop(platform_app, fingerprint_ghbm_prop) - -# TODO(b/184768835): remove this once the bug is fixed -# Fingerprint (UDFPS) LHBM access -userdebug_or_eng(` - allow platform_app sysfs_leds:dir search; - allow platform_app sysfs_lhbm:file rw_file_perms; -') diff --git a/legacy/priv_app.te b/legacy/priv_app.te deleted file mode 100644 index a9b49c33..00000000 --- a/legacy/priv_app.te +++ /dev/null @@ -1,9 +0,0 @@ -# Allows privileged applications to discover the EdgeTPU service. -allow priv_app edgetpu_app_service:service_manager find; - -# Allows privileged applications to discover the NNAPI TPU service. -allow priv_app edgetpu_nnapi_service:service_manager find; - -# Allows privileged applications to access the EdgeTPU device, except open, -# which is guarded by the EdgeTPU service. -allow priv_app edgetpu_device:chr_file { getattr read write ioctl map }; diff --git a/legacy/untrusted_app_all.te b/legacy/untrusted_app_all.te deleted file mode 100644 index a4d8beb8..00000000 --- a/legacy/untrusted_app_all.te +++ /dev/null @@ -1,3 +0,0 @@ -# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap -# for secure video playback -allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;