Remove rules for binary that is not on the device.

This was removed from the device in
I6fe5148d6b50b7c5706c09662a1ed0e7da4cb987.

Bug: 79551588
Test: Booted device and observed no relevant errors.
Change-Id: I35a114c10e8e116879ef2fd90487503805610c98
This commit is contained in:
Joel Galenson
2018-10-08 13:28:57 -07:00
parent b67dd879d4
commit 82455337ea
7 changed files with 0 additions and 24 deletions

View File

@@ -342,10 +342,6 @@ on zygote-start
# Create directory used by display clients
mkdir /data/misc/display 0770 system graphics
# Create perfd related dirs
mkdir /data/system/perfd 0770 root system
chmod 2770 /data/system/perfd
# Setup sensors-related directories and permissions
mkdir /persist/sensors 0775
chown root system /persist/sensors

View File

@@ -42,7 +42,6 @@ type proc_wifi_dbg, fs_type, proc_type;
type qmuxd_socket, file_type;
type netmgrd_socket, file_type;
type thermal_socket, file_type;
type perfd_socket, file_type;
type ims_socket, file_type;
type ipacm_socket, file_type;

View File

@@ -53,7 +53,6 @@
/dev/socket/thermal-send-client u:object_r:thermal_socket:s0
/dev/socket/thermal-recv-client u:object_r:thermal_socket:s0
/dev/socket/thermal-recv-passive-client u:object_r:thermal_socket:s0
/dev/socket/perfd u:object_r:perfd_socket:s0
/dev/socket/netmgr(/.*)? u:object_r:netmgrd_socket:s0
/dev/nq-nci u:object_r:nfc_device:s0
/dev/ttyHS0 u:object_r:hci_attach_dev:s0
@@ -124,7 +123,6 @@
/vendor/bin/hw/android\.hardware\.vr@1\.0-service\.wahoo u:object_r:hal_vr_default_exec:s0
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:hal_fingerprint_default_exec:s0
/vendor/bin/msm_irqbalance u:object_r:irqbalance_exec:s0
/vendor/bin/perfd u:object_r:perfd_exec:s0
/vendor/bin/thermal-engine u:object_r:thermal-engine_exec:s0
/vendor/bin/sensors\.qcom u:object_r:sensors_exec:s0
/vendor/bin/ssr_setup u:object_r:ssr_setup_exec:s0

View File

@@ -3,9 +3,6 @@ r_dir_file(hal_audio_default, sysfs_soc)
allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms;
allow hal_audio_default audio_vendor_data_file:file create_file_perms;
dontaudit hal_audio_default perfd:unix_stream_socket connectto;
dontaudit hal_audio_default perfd_socket:sock_file write;
hal_client_domain(hal_audio_default, hal_power)
userdebug_or_eng(`

View File

@@ -1,8 +1,3 @@
# communicate with perfd
dontaudit hal_camera perfd:unix_stream_socket connectto;
dontaudit hal_camera perfd_socket:sock_file write;
dontaudit hal_camera perfd_socket:sock_file w_file_perms;
allow hal_camera self:capability sys_nice;
allow hal_camera gpu_device:chr_file rw_file_perms;

View File

@@ -1,8 +1,3 @@
# VIDEO_DECODE_PLAYBACK_HINT is for interactive governor in HMP kernels
# Do not grant the access
dontaudit mediacodec perfd:unix_stream_socket connectto;
dontaudit mediacodec perfd_socket:sock_file write;
allow mediacodec sysfs_soc:file r_file_perms;
allow mediacodec sysfs_soc:dir search;

View File

@@ -1,4 +0,0 @@
type perfd, domain;
type perfd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(perfd)