msm8974-common: Nuke our copy of SELinux policies

We now get the qcom-common SELinux policy.  Get rid of our old policy
and add back config as we need it, rather than trying to merge the two.

Change-Id: I5ca5098c653f09c7901343d0ae71793f6eb21ab8
This commit is contained in:
Christopher R. Palmer 2014-11-12 11:12:51 -05:00 committed by Ethan Chen
parent d96a6cd3d1
commit ef32c33672
22 changed files with 0 additions and 165 deletions

View File

@ -52,33 +52,6 @@ MAX_EGL_CACHE_SIZE := 2048*1024
# Fonts
EXTENDED_FONT_FOOTPRINT := true
# SELinux
BOARD_SEPOLICY_DIRS += \
device/samsung/msm8974-common/sepolicy
BOARD_SEPOLICY_UNION += \
file_contexts \
app.te \
bluetooth.te \
device.te \
domain.te \
drmserver.te \
file.te \
hci_init.te \
healthd.te \
init.te \
init_shell.te \
keystore.te \
kickstart.te \
mediaserver.te \
nfc.te \
rild.te \
surfaceflinger.te \
system.te \
ueventd.te \
wpa.te \
wpa_socket.te
# Time services
BOARD_USES_QC_TIME_SERVICES := true

View File

@ -1,3 +0,0 @@
# Grant GPU access to all processes started by Zygote.
# They need that to render the standard UI.
allow appdomain gpu_device:chr_file rw_file_perms;

View File

@ -1 +0,0 @@
allow bluetooth smd_device:chr_file rw_file_perms;

View File

@ -1,17 +0,0 @@
# GPU (used by most UI apps)
type gpu_device, dev_type;
# Qualcomm Secure Execution Environment Communicator (QSEECOM) device
type qseecom_device, dev_type;
type diag_device, dev_type;
type bcm2079x_device, dev_type;
# Qualcomm MSM Audio ACDB device
type msm_acdb_device, dev_type;
# Kickstart device used by QC qcks
type kickstart_device, dev_type;
# SMD device, used by hci_qcomm_init
type smd_device, dev_type;

View File

@ -1 +0,0 @@
allow domain init_tmpfs:file read;

View File

@ -1,3 +0,0 @@
# Grant DRM Service access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device
allow drmserver qseecom_device:chr_file rw_file_perms;
allow drmserver sdcard_external:file open;

View File

@ -1,11 +0,0 @@
# Qualcomm MSM Interface (QMI) socket types
type qmux_audio_socket, file_type;
type qmux_bluetooth_socket, file_type;
type qmux_gps_socket, file_type;
type qmux_radio_socket, file_type;
type firmware_file, fs_type;
allow efs_file rootfs:filesystem associate;
allow cache_file rootfs:filesystem associate;
allow asec_apk_file rootfs:filesystem associate;

View File

@ -1,33 +0,0 @@
# GPU device
/dev/kgsl-3d0 u:object_r:gpu_device:s0
/dev/msm_rotator u:object_r:gpu_device:s0
# Qualcomm Secure Execution Environment Communicator (QSEECOM) device
/dev/qseecom u:object_r:qseecom_device:s0
# Qualcomm MSM Interface (QMI) devices
/dev/socket/qmux_audio/* u:object_r:qmux_audio_socket:s0
/dev/socket/qmux_bluetooth/* u:object_r:qmux_bluetooth_socket:s0
/dev/socket/qmux_gps/* u:object_r:qmux_gps_socket:s0
/dev/socket/qmux_radio/* u:object_r:qmux_radio_socket:s0
/dev/bcm2079x-i2c u:object_r:bcm2079x_device:s0
/dev/diag u:object_r:diag_device:s0
/dev/media([0-9])+ u:object_r:camera_device:s0
/dev/smd([0-9])+ u:object_r:smd_device:s0
/dev/mdm u:object_r:radio_device:s0
# Qualcomm MSM Audio ACDB device
/dev/msm_acdb u:object_r:msm_acdb_device:s0
/dev/ks_hsic_bridge u:object_r:kickstart_device:s0
/dev/efs_hsic_bridge u:object_r:kickstart_device:s0
/system/bin/qcks u:object_r:kickstart_exec:s0
/system/bin/efsks u:object_r:kickstart_exec:s0
/system/bin/ks u:object_r:kickstart_exec:s0
/data/nfc(/.*)? u:object_r:nfc_data_file:s0
/system/bin/hci_qcomm_init u:object_r:hci_exec:s0
/system/bin/bdAddrLoader u:object_r:hci_exec:s0

View File

@ -1,6 +0,0 @@
type hci_init, domain;
permissive hci_init;
type hci_exec, file_type, exec_type;
type hci_data_file, file_type;
domain_auto_trans(shell, hci_exec, hci_init)
unconfined_domain(hci_init)

View File

@ -1 +0,0 @@
allow healthd rootfs:file entrypoint;

View File

@ -1 +0,0 @@
allow init wpa_socket:unix_dgram_socket { bind create };

View File

@ -1,6 +0,0 @@
allow init_shell diag_device:chr_file { read write };
allow init_shell hci_exec:file rx_file_perms;
allow init_shell bluetooth_prop:property_service set;
allow init_shell smd_device:chr_file rw_file_perms;
allow init_shell unlabeled:file r_file_perms;
allow init_shell init:fifo_file r_file_perms;

View File

@ -1,3 +0,0 @@
# Grant keystore daemon access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device
allow keystore qseecom_device:chr_file rw_file_perms;

View File

@ -1,5 +0,0 @@
type kickstart, domain;
permissive kickstart;
type kickstart_exec, file_type, exec_type;
domain_auto_trans(init, kickstart_exec, kickstart)
unconfined_domain(kickstart)

View File

@ -1,13 +0,0 @@
# Grant access to Qualcomm MSM Audio ACDB device to mediaserver
allow mediaserver msm_acdb_device:chr_file rw_file_perms;
# Grant access to Qualcomm MSM Interface (QMI) audio sockets to mediaserver
allow mediaserver qmux_audio_socket:sock_file create_file_perms;
allow mediaserver qmux_audio_socket:dir rw_dir_perms;
# Permit mediaserver to create sockets
allow mediaserver self:socket create;
# Grant access to audio firmware files to mediaserver
allow mediaserver audio_firmware_file:dir ra_dir_perms;
allow mediaserver audio_firmware_file:file create_file_perms;

View File

@ -1 +0,0 @@
allow nfc bcm2079x_device:chr_file rw_file_perms;

View File

@ -1,5 +0,0 @@
allow rild diag_device:chr_file rw_file_perms;
# Grant access to Qualcomm MSM Interface (QMI) radio sockets to RILD
allow rild qmux_radio_socket:sock_file create_file_perms;
allow rild qmux_radio_socket:dir rw_dir_perms;

View File

@ -1,9 +0,0 @@
# Grant GPU access to SurfaceFlinger
allow surfaceflinger gpu_device:chr_file rw_file_perms;
allow surfaceflinger sysfs:file rw_file_perms;
# Read from /data/local/tmp
allow surfaceflinger shell_data_file:dir search;
allow surfaceflinger shell_data_file:file { open getattr read };
allow surfaceflinger shell_data_file:lnk_file read;

View File

@ -1,10 +0,0 @@
# Grant GPU access to system apps (e.g., PowerManagerService)
allow system gpu_device:chr_file rw_file_perms;
allow system diag_device:chr_file rw_file_perms;
# Grant access to Qualcomm MSM Interface (QMI) radio sockets to system apps
# (e.g., LocationManager)
allow system qmux_radio_socket:sock_file create_file_perms;
allow system qmux_radio_socket:dir rw_dir_perms;
allow system wpa_socket:unix_dgram_socket sendto;

View File

@ -1,6 +0,0 @@
allow ueventd sdcard_external:dir search;
allow ueventd sdcard_external:file r_file_perms;
allow ueventd wifi_data_file:dir search;
allow ueventd wifi_data_file:file r_file_perms;
allow ueventd firmware_file:dir r_dir_perms;
allow ueventd firmware_file:file r_file_perms;

View File

@ -1,2 +0,0 @@
allow wpa devpts:chr_file rw_file_perms;
allow wpa wpa_socket:unix_dgram_socket { read write };

View File

@ -1 +0,0 @@
allow wpa_socket system:unix_dgram_socket sendto;