Merge "qmuxd.te: Remove all references"
This commit is contained in:
commit
8ba2bd2776
8 changed files with 0 additions and 25 deletions
1
vendor/common/file.te
vendored
1
vendor/common/file.te
vendored
|
@ -52,7 +52,6 @@ type debugfs_icnss, debugfs_type, fs_type;
|
|||
type proc_wifi_dbg, fs_type, proc_type;
|
||||
type proc_audiod, fs_type;
|
||||
|
||||
type qmuxd_socket, file_type;
|
||||
type netmgrd_socket, file_type;
|
||||
type thermal_socket, file_type;
|
||||
|
||||
|
|
6
vendor/common/file_contexts
vendored
6
vendor/common/file_contexts
vendored
|
@ -43,11 +43,6 @@
|
|||
# dev socket nodes
|
||||
/dev/socket/chre u:object_r:chre_socket:s0
|
||||
/dev/socket/oemlock u:object_r:hal_bootctl_socket:s0
|
||||
/dev/socket/qmux_audio(/.*)? u:object_r:qmuxd_socket:s0
|
||||
/dev/socket/qmux_bluetooth(/.*)? u:object_r:qmuxd_socket:s0
|
||||
/dev/socket/qmux_gps(/.*)? u:object_r:qmuxd_socket:s0
|
||||
/dev/socket/qmux_nfc(/.*)? u:object_r:qmuxd_socket:s0
|
||||
/dev/socket/qmux_radio(/.*)? u:object_r:qmuxd_socket:s0
|
||||
/dev/socket/ims_qmid u:object_r:ims_socket:s0
|
||||
/dev/socket/ims_datad u:object_r:ims_socket:s0
|
||||
/dev/socket/ipacm_log_file u:object_r:ipacm_socket:s0
|
||||
|
@ -111,7 +106,6 @@
|
|||
/vendor/bin/ims_rtp_daemon u:object_r:hal_imsrtp_exec:s0
|
||||
/vendor/bin/ipacm u:object_r:hal_tetheroffload_default_exec:s0
|
||||
/vendor/bin/ipacm-diag u:object_r:hal_tetheroffload_default_exec:s0
|
||||
/vendor/bin/qmuxd u:object_r:qmuxd_exec:s0
|
||||
/vendor/bin/cnd u:object_r:cnd_exec:s0
|
||||
/vendor/bin/oemlock_provision u:object_r:hal_bootctl_default_exec:s0
|
||||
/vendor/bin/oemlock-bridge u:object_r:hal_bootctl_default_exec:s0
|
||||
|
|
3
vendor/common/hal_camera.te
vendored
3
vendor/common/hal_camera.te
vendored
|
@ -26,9 +26,6 @@ allow hal_camera system_server:unix_stream_socket { read write };
|
|||
|
||||
allow hal_camera self:socket { create ioctl read write };
|
||||
|
||||
# Grant access to Qualcomm MSM Interface (QMI) radio sockets
|
||||
# qmux_socket(hal_camera)
|
||||
|
||||
# allow hal_camera to call some socket ioctls
|
||||
allowxperm hal_camera self:socket ioctl { IPC_ROUTER_IOCTL_LOOKUP_SERVER IPC_ROUTER_IOCTL_BIND_CONTROL_PORT };
|
||||
|
||||
|
|
5
vendor/common/qmuxd.te
vendored
5
vendor/common/qmuxd.te
vendored
|
@ -1,5 +0,0 @@
|
|||
type qmuxd, domain;
|
||||
type qmuxd_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
net_domain(qmuxd)
|
||||
init_daemon_domain(qmuxd)
|
3
vendor/common/radio.te
vendored
3
vendor/common/radio.te
vendored
|
@ -1,9 +1,6 @@
|
|||
get_prop(radio, ims_prop)
|
||||
userdebug_or_eng(`set_prop(radio, tel_mon_prop)')
|
||||
|
||||
allow radio qmuxd_socket:dir search;
|
||||
allow radio qmuxd_socket:sock_file write;
|
||||
|
||||
allow radio vendor_file:lnk_file r_file_perms;
|
||||
allow radio vendor_framework_file:file r_file_perms;
|
||||
allow radio vendor_framework_file:dir search;
|
||||
|
|
3
vendor/common/rild.te
vendored
3
vendor/common/rild.te
vendored
|
@ -2,9 +2,6 @@ binder_call(rild, per_mgr)
|
|||
|
||||
vndbinder_use(rild)
|
||||
|
||||
allow rild qmuxd_socket:dir w_dir_perms;
|
||||
allow rild qmuxd_socket:sock_file create_file_perms;
|
||||
|
||||
allow rild netmgrd_socket:dir search;
|
||||
unix_socket_connect(rild, netmgrd, netmgrd)
|
||||
|
||||
|
|
2
vendor/test/qmi_ping.te
vendored
2
vendor/test/qmi_ping.te
vendored
|
@ -43,6 +43,4 @@ userdebug_or_eng(`
|
|||
#enable running test as root user => privileged process
|
||||
#enable privileged processes to bypass permission checks
|
||||
allow qmi_ping qmi_ping:capability {setgid setuid fsetid};
|
||||
#QCCI calls qmuxd API. The API will internally require this
|
||||
qmux_socket(qmi_ping);
|
||||
')
|
||||
|
|
2
vendor/test/qmi_test_service.te
vendored
2
vendor/test/qmi_test_service.te
vendored
|
@ -45,8 +45,6 @@ userdebug_or_eng(`
|
|||
#enable running test as root user => privileged process
|
||||
#enable privileged processes to bypass permission checks
|
||||
allow qmi_test_service qmi_test_service:capability {setgid setuid fsetid};
|
||||
#QCCI calls qmuxd API. The API will internally require this
|
||||
qmux_socket(qmi_test_service);
|
||||
#enable accessing the system health monitor to check the system health,
|
||||
#if a request times out
|
||||
allow qmi_test_service system_health_monitor_device:chr_file rw_file_perms;
|
||||
|
|
Loading…
Reference in a new issue