diff --git a/legacy/file.te b/legacy/file.te index ab44ecd5..a0b05219 100644 --- a/legacy/file.te +++ b/legacy/file.te @@ -9,7 +9,6 @@ type vendor_cbd_log_file, file_type, data_file_type; type vendor_rfsd_log_file, file_type, data_file_type; type vendor_dump_log_file, file_type, data_file_type; type vendor_rild_log_file, file_type, data_file_type; -type vendor_sced_log_file, file_type, data_file_type; type vendor_telephony_log_file, file_type, data_file_type; type vendor_vcd_log_file, file_type, data_file_type; diff --git a/legacy/file_contexts b/legacy/file_contexts index 53fe573f..711c7d22 100644 --- a/legacy/file_contexts +++ b/legacy/file_contexts @@ -119,7 +119,6 @@ /(vendor|system/vendor)/bin/hw/lhd u:object_r:lhd_exec:s0 /(vendor|system/vendor)/bin/hw/rild_exynos u:object_r:rild_exec:s0 /(vendor|system/vendor)/bin/rfsd u:object_r:rfsd_exec:s0 -/(vendor|system/vendor)/bin/sced u:object_r:sced_exec:s0 /(vendor|system/vendor)/bin/vcd u:object_r:vcd_exec:s0 /(vendor|system/vendor)/bin/bipchmgr u:object_r:bipchmgr_exec:s0 @@ -137,7 +136,6 @@ /data/vendor/log/rfsd(/.*)? u:object_r:vendor_rfsd_log_file:s0 /data/vendor/log/dump(/.*)? u:object_r:vendor_dump_log_file:s0 /data/vendor/log/rild(/.*)? u:object_r:vendor_rild_log_file:s0 -/data/vendor/log/sced(/.*)? u:object_r:vendor_sced_log_file:s0 /data/vendor/log/vcd(/.*)? u:object_r:vendor_vcd_log_file:s0 /persist/sensorcal\.json u:object_r:sensors_cal_file:s0 diff --git a/legacy/sced.te b/legacy/sced.te deleted file mode 100644 index c5382079..00000000 --- a/legacy/sced.te +++ /dev/null @@ -1,22 +0,0 @@ -type sced, domain; -type sced_exec, vendor_file_type, exec_type, file_type; -init_daemon_domain(sced) - -userdebug_or_eng(` -typeattribute sced vendor_executes_system_violators; - -hwbinder_use(sced) -binder_call(sced, dmd) - -get_prop(sced, hwservicemanager_prop) -allow sced self:packet_socket create_socket_perms_no_ioctl; - -allow sced self:capability net_raw; -allow sced shell_exec:file rx_file_perms; -allow sced tcpdump_exec:file rx_file_perms; -allow sced vendor_shell_exec:file x_file_perms; -allow sced vendor_slog_file:dir create_dir_perms; -allow sced vendor_slog_file:file create_file_perms; -allow sced hidl_base_hwservice:hwservice_manager add; -allow sced hal_vendor_oem_hwservice:hwservice_manager { add find }; -') diff --git a/whitechapel_pro/file_contexts b/whitechapel_pro/file_contexts index 2a5abc69..e23f0847 100644 --- a/whitechapel_pro/file_contexts +++ b/whitechapel_pro/file_contexts @@ -1,6 +1,7 @@ # Binaries /vendor/bin/dmd u:object_r:dmd_exec:s0 /vendor/bin/modem_logging_control u:object_r:modem_logging_control_exec:s0 +/vendor/bin/sced u:object_r:sced_exec:s0 # Vendor Firmwares /vendor/firmware(/.*)? u:object_r:vendor_fw_file:s0 @@ -20,4 +21,4 @@ /data/vendor/radio(/.*)? u:object_r:radio_vendor_data_file:s0 # Extra mount images -/mnt/vendor/modem_img(/.*)? u:object_r:modem_img_file:s0 +/mnt/vendor/modem_img(/.*)? u:object_r:modem_img_file:s0 diff --git a/whitechapel_pro/sced.te b/whitechapel_pro/sced.te new file mode 100644 index 00000000..07c5fa01 --- /dev/null +++ b/whitechapel_pro/sced.te @@ -0,0 +1,22 @@ +type sced, domain; +type sced_exec, vendor_file_type, exec_type, file_type; + +userdebug_or_eng(` + init_daemon_domain(sced) + typeattribute sced vendor_executes_system_violators; + + hwbinder_use(sced) + binder_call(sced, dmd) + + get_prop(sced, hwservicemanager_prop) + allow sced self:packet_socket create_socket_perms_no_ioctl; + + allow sced self:capability net_raw; + allow sced shell_exec:file rx_file_perms; + allow sced tcpdump_exec:file rx_file_perms; + allow sced vendor_shell_exec:file x_file_perms; + allow sced vendor_slog_file:dir create_dir_perms; + allow sced vendor_slog_file:file create_file_perms; + allow sced hidl_base_hwservice:hwservice_manager add; + allow sced hal_vendor_oem_hwservice:hwservice_manager { add find }; +')