diff options
author | andi34 <skate4life@gmx.de> | 2015-08-12 12:41:03 +0200 |
---|---|---|
committer | Andreas Blaesius <skate4life@gmx.de> | 2015-08-12 21:51:14 +0200 |
commit | c3efcb0fc78724c830ca6895893dcc54c368a39e (patch) | |
tree | 31cfba19c3dd6afa03f12d41efa3f59ab48f00f0 /sepolicy | |
parent | aef65ac5b00bd1948816abae5232e70ee126e844 (diff) | |
download | device_samsung_espresso3g-c3efcb0fc78724c830ca6895893dcc54c368a39e.zip device_samsung_espresso3g-c3efcb0fc78724c830ca6895893dcc54c368a39e.tar.gz device_samsung_espresso3g-c3efcb0fc78724c830ca6895893dcc54c368a39e.tar.bz2 |
P51xx: move to espresso-common repo (1/2)
Change-Id: If95daa33ddb81c48920b2914b7e97863c2c45881
Diffstat (limited to 'sepolicy')
-rw-r--r-- | sepolicy/device.te | 3 | ||||
-rw-r--r-- | sepolicy/dock_kbd_attach.te | 8 | ||||
-rw-r--r-- | sepolicy/file.te | 2 | ||||
-rw-r--r-- | sepolicy/file_contexts | 19 | ||||
-rw-r--r-- | sepolicy/geomagneticd.te | 12 | ||||
-rw-r--r-- | sepolicy/gpsd.te | 8 | ||||
-rw-r--r-- | sepolicy/orientationd.te | 9 | ||||
-rw-r--r-- | sepolicy/smc_pa.te | 8 | ||||
-rw-r--r-- | sepolicy/sysinit.te | 2 |
9 files changed, 0 insertions, 71 deletions
diff --git a/sepolicy/device.te b/sepolicy/device.te deleted file mode 100644 index d938e5e..0000000 --- a/sepolicy/device.te +++ /dev/null @@ -1,3 +0,0 @@ -# Device types -type dock_device, dev_type; -type smc_device, dev_type; diff --git a/sepolicy/dock_kbd_attach.te b/sepolicy/dock_kbd_attach.te deleted file mode 100644 index 267763a..0000000 --- a/sepolicy/dock_kbd_attach.te +++ /dev/null @@ -1,8 +0,0 @@ -# dock_kbd_attach -type dock_kbd_attach, domain; -type dock_kbd_attach_exec, exec_type, file_type; - -init_daemon_domain(dock_kbd_attach) - -allow dock_kbd_attach dock_device:chr_file { open read write ioctl }; -allow dock_kbd_attach self:capability { sys_admin };
\ No newline at end of file diff --git a/sepolicy/file.te b/sepolicy/file.te deleted file mode 100644 index ee55a50..0000000 --- a/sepolicy/file.te +++ /dev/null @@ -1,2 +0,0 @@ -# Filesystem types -type sensor_data_file, file_type, data_file_type; diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts deleted file mode 100644 index 58bf32a..0000000 --- a/sepolicy/file_contexts +++ /dev/null @@ -1,19 +0,0 @@ -# Dock -/dev/ttyO3 u:object_r:dock_device:s0 -/system/bin/dock_kbd_attach u:object_r:dock_kbd_attach_exec:s0 - -# DRM -/dev/tf_ctrl u:object_r:smc_device:s0 -/system/bin/smc_pa_ctrl u:object_r:smc_pa_exec:s0 - -# EFS -/dev/block/mmcblk0p1 u:object_r:efs_block_device:s0 -/dev/block/mmcblk0p8 u:object_r:efs_block_device:s0 - -# GPS -/system/bin/gpsd u:object_r:gpsd_exec:s0 - -# Sensors -/data/system/yas*.cfg u:object_r:sensor_data_file:s0 -/system/bin/geomagneticd u:object_r:geomagneticd_exec:s0 -/system/bin/orientationd u:object_r:orientationd_exec:s0 diff --git a/sepolicy/geomagneticd.te b/sepolicy/geomagneticd.te deleted file mode 100644 index fe1dd42..0000000 --- a/sepolicy/geomagneticd.te +++ /dev/null @@ -1,12 +0,0 @@ -# geomagneticd -type geomagneticd, domain; -type geomagneticd_exec, exec_type, file_type; - -init_daemon_domain(geomagneticd) - -allow geomagneticd input_device:chr_file { read open ioctl }; -allow geomagneticd input_device:dir { search read open }; -allow geomagneticd self:process { execmem }; -allow geomagneticd sensor_data_file:dir { write add_name remove_name create }; -allow geomagneticd sensor_data_file:file { create open read write getattr setattr rename }; -allow geomagneticd sysfs:file { write }; diff --git a/sepolicy/gpsd.te b/sepolicy/gpsd.te deleted file mode 100644 index 6fabca6..0000000 --- a/sepolicy/gpsd.te +++ /dev/null @@ -1,8 +0,0 @@ -# gpsd - GPS daemon -allow gpsd rild:unix_stream_socket { connectto }; -allow gpsd self:process { execmem }; -allow gpsd sysfs_wake_lock:file { read write }; - -# TODO - Label with gps_data_file -allow gpsd system_data_file:dir { write add_name }; -allow gpsd system_data_file:fifo_file { create setattr write open }; diff --git a/sepolicy/orientationd.te b/sepolicy/orientationd.te deleted file mode 100644 index 672c473..0000000 --- a/sepolicy/orientationd.te +++ /dev/null @@ -1,9 +0,0 @@ -# orientationd -type orientationd, domain; -type orientationd_exec, exec_type, file_type; - -init_daemon_domain(orientationd) - -allow orientationd input_device:chr_file { read write open ioctl }; -allow orientationd input_device:dir { search read open }; -allow orientationd self:process { execmem }; diff --git a/sepolicy/smc_pa.te b/sepolicy/smc_pa.te deleted file mode 100644 index de15f41..0000000 --- a/sepolicy/smc_pa.te +++ /dev/null @@ -1,8 +0,0 @@ -# smc_pa -type smc_pa, domain; -type smc_pa_exec, exec_type, file_type; - -init_daemon_domain(smc_pa) - -allow smc_pa self:capability { dac_override }; -allow smc_pa smc_device:chr_file { read write open ioctl }; diff --git a/sepolicy/sysinit.te b/sepolicy/sysinit.te deleted file mode 100644 index 2907f73..0000000 --- a/sepolicy/sysinit.te +++ /dev/null @@ -1,2 +0,0 @@ -# sysinit -allow sysinit surfaceflinger_exec:file { getattr }; |