remove permissions that are not relevant to boot

Bug: 254378739
Test: boot to home with no relevant error
Change-Id: Ie1bd477aeaf5fc38ce9d5160a7512cdfa17df9e3
This commit is contained in:
Adam Shih 2022-11-23 13:45:50 +08:00
parent 99c109ba73
commit ed05e53cd7
6 changed files with 0 additions and 23 deletions

View file

@ -1 +0,0 @@
dontaudit installd modem_img_file:filesystem quotaget;

View file

@ -1,10 +0,0 @@
# OMADM app
type omadm_app, domain;
app_domain(omadm_app)
net_domain(omadm_app)
allow omadm_app radio_vendor_data_file:dir rw_dir_perms;
allow omadm_app radio_vendor_data_file:file create_file_perms;
allow omadm_app app_api_service:service_manager find;
allow omadm_app radio_service:service_manager find;

View file

@ -4,9 +4,6 @@ user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_d
# Domain for OFLBasicAgentApp to support NFC/eSIM fw upgrade # Domain for OFLBasicAgentApp to support NFC/eSIM fw upgrade
user=_app isPrivApp=true seinfo=platform name=com.thales.device.ofl.app.basicagent domain=ofl_app type=app_data_file levelFrom=user user=_app isPrivApp=true seinfo=platform name=com.thales.device.ofl.app.basicagent domain=ofl_app type=app_data_file levelFrom=user
# Domain for omadm
user=_app isPrivApp=true seinfo=platform name=com.android.omadm.service domain=omadm_app type=app_data_file levelFrom=all
# HbmSVManager # HbmSVManager
user=_app seinfo=platform name=com.android.hbmsvmanager domain=hbmsvmanager_app type=app_data_file levelFrom=all user=_app seinfo=platform name=com.android.hbmsvmanager domain=hbmsvmanager_app type=app_data_file levelFrom=all

View file

@ -1,5 +0,0 @@
# Allow access to the SJTAG kernel interface from the shell
userdebug_or_eng(`
allow shell sysfs_sjtag:dir r_dir_perms;
allow shell sysfs_sjtag:file rw_file_perms;
')

View file

@ -1 +0,0 @@
allow surfaceflinger vendor_fw_file:dir search;

View file

@ -1,3 +0,0 @@
allow toolbox ram_device:blk_file rw_file_perms;
allow toolbox per_boot_file:dir create_dir_perms;
allow toolbox per_boot_file:file create_file_perms;