mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-01-27 18:19:03 +00:00
Remove rules for binary that is not on the device.
am: 82455337ea
Change-Id: Iac32b14cf30a0ee0fcf2026d680e91f622d93e31
This commit is contained in:
@@ -342,10 +342,6 @@ on zygote-start
|
||||
# Create directory used by display clients
|
||||
mkdir /data/misc/display 0770 system graphics
|
||||
|
||||
# Create perfd related dirs
|
||||
mkdir /data/system/perfd 0770 root system
|
||||
chmod 2770 /data/system/perfd
|
||||
|
||||
# Setup sensors-related directories and permissions
|
||||
mkdir /persist/sensors 0775
|
||||
chown root system /persist/sensors
|
||||
|
||||
1
sepolicy/vendor/file.te
vendored
1
sepolicy/vendor/file.te
vendored
@@ -42,7 +42,6 @@ type proc_wifi_dbg, fs_type, proc_type;
|
||||
type qmuxd_socket, file_type;
|
||||
type netmgrd_socket, file_type;
|
||||
type thermal_socket, file_type;
|
||||
type perfd_socket, file_type;
|
||||
|
||||
type ims_socket, file_type;
|
||||
type ipacm_socket, file_type;
|
||||
|
||||
2
sepolicy/vendor/file_contexts
vendored
2
sepolicy/vendor/file_contexts
vendored
@@ -53,7 +53,6 @@
|
||||
/dev/socket/thermal-send-client u:object_r:thermal_socket:s0
|
||||
/dev/socket/thermal-recv-client u:object_r:thermal_socket:s0
|
||||
/dev/socket/thermal-recv-passive-client u:object_r:thermal_socket:s0
|
||||
/dev/socket/perfd u:object_r:perfd_socket:s0
|
||||
/dev/socket/netmgr(/.*)? u:object_r:netmgrd_socket:s0
|
||||
/dev/nq-nci u:object_r:nfc_device:s0
|
||||
/dev/ttyHS0 u:object_r:hci_attach_dev:s0
|
||||
@@ -124,7 +123,6 @@
|
||||
/vendor/bin/hw/android\.hardware\.vr@1\.0-service\.wahoo u:object_r:hal_vr_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:hal_fingerprint_default_exec:s0
|
||||
/vendor/bin/msm_irqbalance u:object_r:irqbalance_exec:s0
|
||||
/vendor/bin/perfd u:object_r:perfd_exec:s0
|
||||
/vendor/bin/thermal-engine u:object_r:thermal-engine_exec:s0
|
||||
/vendor/bin/sensors\.qcom u:object_r:sensors_exec:s0
|
||||
/vendor/bin/ssr_setup u:object_r:ssr_setup_exec:s0
|
||||
|
||||
3
sepolicy/vendor/hal_audio_default.te
vendored
3
sepolicy/vendor/hal_audio_default.te
vendored
@@ -3,9 +3,6 @@ r_dir_file(hal_audio_default, sysfs_soc)
|
||||
allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms;
|
||||
allow hal_audio_default audio_vendor_data_file:file create_file_perms;
|
||||
|
||||
dontaudit hal_audio_default perfd:unix_stream_socket connectto;
|
||||
dontaudit hal_audio_default perfd_socket:sock_file write;
|
||||
|
||||
hal_client_domain(hal_audio_default, hal_power)
|
||||
|
||||
userdebug_or_eng(`
|
||||
|
||||
5
sepolicy/vendor/hal_camera.te
vendored
5
sepolicy/vendor/hal_camera.te
vendored
@@ -1,8 +1,3 @@
|
||||
# communicate with perfd
|
||||
dontaudit hal_camera perfd:unix_stream_socket connectto;
|
||||
dontaudit hal_camera perfd_socket:sock_file write;
|
||||
dontaudit hal_camera perfd_socket:sock_file w_file_perms;
|
||||
|
||||
allow hal_camera self:capability sys_nice;
|
||||
|
||||
allow hal_camera gpu_device:chr_file rw_file_perms;
|
||||
|
||||
5
sepolicy/vendor/mediacodec.te
vendored
5
sepolicy/vendor/mediacodec.te
vendored
@@ -1,8 +1,3 @@
|
||||
# VIDEO_DECODE_PLAYBACK_HINT is for interactive governor in HMP kernels
|
||||
# Do not grant the access
|
||||
dontaudit mediacodec perfd:unix_stream_socket connectto;
|
||||
dontaudit mediacodec perfd_socket:sock_file write;
|
||||
|
||||
allow mediacodec sysfs_soc:file r_file_perms;
|
||||
allow mediacodec sysfs_soc:dir search;
|
||||
|
||||
|
||||
4
sepolicy/vendor/perfd.te
vendored
4
sepolicy/vendor/perfd.te
vendored
@@ -1,4 +0,0 @@
|
||||
type perfd, domain;
|
||||
type perfd_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
init_daemon_domain(perfd)
|
||||
Reference in New Issue
Block a user