diff --git a/init.hardware.rc b/init.hardware.rc index 5c7e69f3..33b1be33 100644 --- a/init.hardware.rc +++ b/init.hardware.rc @@ -342,10 +342,6 @@ on zygote-start # Create directory used by display clients mkdir /data/misc/display 0770 system graphics - # Create perfd related dirs - mkdir /data/system/perfd 0770 root system - chmod 2770 /data/system/perfd - # Setup sensors-related directories and permissions mkdir /persist/sensors 0775 chown root system /persist/sensors diff --git a/sepolicy/vendor/file.te b/sepolicy/vendor/file.te index e85ebc48..a43fb2b8 100644 --- a/sepolicy/vendor/file.te +++ b/sepolicy/vendor/file.te @@ -42,7 +42,6 @@ type proc_wifi_dbg, fs_type, proc_type; type qmuxd_socket, file_type; type netmgrd_socket, file_type; type thermal_socket, file_type; -type perfd_socket, file_type; type ims_socket, file_type; type ipacm_socket, file_type; diff --git a/sepolicy/vendor/file_contexts b/sepolicy/vendor/file_contexts index a7967e11..d3454514 100644 --- a/sepolicy/vendor/file_contexts +++ b/sepolicy/vendor/file_contexts @@ -53,7 +53,6 @@ /dev/socket/thermal-send-client u:object_r:thermal_socket:s0 /dev/socket/thermal-recv-client u:object_r:thermal_socket:s0 /dev/socket/thermal-recv-passive-client u:object_r:thermal_socket:s0 -/dev/socket/perfd u:object_r:perfd_socket:s0 /dev/socket/netmgr(/.*)? u:object_r:netmgrd_socket:s0 /dev/nq-nci u:object_r:nfc_device:s0 /dev/ttyHS0 u:object_r:hci_attach_dev:s0 @@ -124,7 +123,6 @@ /vendor/bin/hw/android\.hardware\.vr@1\.0-service\.wahoo u:object_r:hal_vr_default_exec:s0 /vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:hal_fingerprint_default_exec:s0 /vendor/bin/msm_irqbalance u:object_r:irqbalance_exec:s0 -/vendor/bin/perfd u:object_r:perfd_exec:s0 /vendor/bin/thermal-engine u:object_r:thermal-engine_exec:s0 /vendor/bin/sensors\.qcom u:object_r:sensors_exec:s0 /vendor/bin/ssr_setup u:object_r:ssr_setup_exec:s0 diff --git a/sepolicy/vendor/hal_audio_default.te b/sepolicy/vendor/hal_audio_default.te index 47f4f7e3..8f0079d5 100644 --- a/sepolicy/vendor/hal_audio_default.te +++ b/sepolicy/vendor/hal_audio_default.te @@ -3,9 +3,6 @@ r_dir_file(hal_audio_default, sysfs_soc) allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms; allow hal_audio_default audio_vendor_data_file:file create_file_perms; -dontaudit hal_audio_default perfd:unix_stream_socket connectto; -dontaudit hal_audio_default perfd_socket:sock_file write; - hal_client_domain(hal_audio_default, hal_power) userdebug_or_eng(` diff --git a/sepolicy/vendor/hal_camera.te b/sepolicy/vendor/hal_camera.te index ad9a0307..7fd55aa1 100644 --- a/sepolicy/vendor/hal_camera.te +++ b/sepolicy/vendor/hal_camera.te @@ -1,8 +1,3 @@ -# communicate with perfd -dontaudit hal_camera perfd:unix_stream_socket connectto; -dontaudit hal_camera perfd_socket:sock_file write; -dontaudit hal_camera perfd_socket:sock_file w_file_perms; - allow hal_camera self:capability sys_nice; allow hal_camera gpu_device:chr_file rw_file_perms; diff --git a/sepolicy/vendor/mediacodec.te b/sepolicy/vendor/mediacodec.te index 1bbadd8e..1c4fe3d4 100644 --- a/sepolicy/vendor/mediacodec.te +++ b/sepolicy/vendor/mediacodec.te @@ -1,8 +1,3 @@ -# VIDEO_DECODE_PLAYBACK_HINT is for interactive governor in HMP kernels -# Do not grant the access -dontaudit mediacodec perfd:unix_stream_socket connectto; -dontaudit mediacodec perfd_socket:sock_file write; - allow mediacodec sysfs_soc:file r_file_perms; allow mediacodec sysfs_soc:dir search; diff --git a/sepolicy/vendor/perfd.te b/sepolicy/vendor/perfd.te deleted file mode 100644 index 950e1d65..00000000 --- a/sepolicy/vendor/perfd.te +++ /dev/null @@ -1,4 +0,0 @@ -type perfd, domain; -type perfd_exec, exec_type, vendor_file_type, file_type; - -init_daemon_domain(perfd)