remove un-reviewable sepolicy

Bug: 196916111
Test: boot to home
Change-Id: Idac79eece3a2e36eca8ad1b1e0ffc8d771f445d3
This commit is contained in:
Adam Shih 2021-09-27 10:46:52 +08:00
parent ad68e7dc96
commit 8c532b1a65
5 changed files with 0 additions and 44 deletions

View file

@ -1,3 +0,0 @@
# Access to /sys/devices/platform/14700000.ufs/*
allow hal_health_storage_default sysfs_scsi_devices_0000:dir r_dir_perms;
allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms;

View file

@ -1,9 +0,0 @@
allow kernel vendor_fw_file:dir search;
allow kernel vendor_fw_file:file r_file_perms;
# ZRam
allow kernel per_boot_file:file r_file_perms;
# memlat needs permision to create/delete perf events when hotplug on/off
allow kernel self:capability2 perfmon;
allow kernel self:perf_event cpu;

View file

@ -1,20 +0,0 @@
binder_call(platform_app, rild)
allow platform_app hal_exynos_rild_hwservice:hwservice_manager find;
allow platform_app nfc_service:service_manager find;
allow platform_app uwb_service:service_manager find;
allow platform_app fwk_stats_service:service_manager find;
binder_use(platform_app)
allow platform_app touch_context_service:service_manager find;
# Fingerprint (UDFPS) GHBM/LHBM toggle
get_prop(platform_app, fingerprint_ghbm_prop)
# TODO(b/184768835): remove this once the bug is fixed
# Fingerprint (UDFPS) LHBM access
userdebug_or_eng(`
allow platform_app sysfs_leds:dir search;
allow platform_app sysfs_lhbm:file rw_file_perms;
')

View file

@ -1,9 +0,0 @@
# Allows privileged applications to discover the EdgeTPU service.
allow priv_app edgetpu_app_service:service_manager find;
# Allows privileged applications to discover the NNAPI TPU service.
allow priv_app edgetpu_nnapi_service:service_manager find;
# Allows privileged applications to access the EdgeTPU device, except open,
# which is guarded by the EdgeTPU service.
allow priv_app edgetpu_device:chr_file { getattr read write ioctl map };

View file

@ -1,3 +0,0 @@
# Allows Exoplayer(and other applications) access to the vstream-secure DMA-BUF heap
# for secure video playback
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;