diff --git a/private/compat/28.0/28.0.cil b/private/compat/28.0/28.0.cil index d3019ecb58e01bbef3e47f7be233271fcfffff2f..323fb0a0c0c1c01b24e8fbd974ae96068a430f82 100644 --- a/private/compat/28.0/28.0.cil +++ b/private/compat/28.0/28.0.cil @@ -1,4 +1,5 @@ ;; types removed from current policy +(type alarm_device) (type audio_seq_device) (type audio_timer_device) (type commontime_management_service) diff --git a/private/file_contexts b/private/file_contexts index 493d782fbb93eb896499b6d60c943290e67c7cf5..abef72b8fc81af5a539da424b79b5323c21f4c2b 100644 --- a/private/file_contexts +++ b/private/file_contexts @@ -71,7 +71,6 @@ /dev/adf[0-9]* u:object_r:graphics_device:s0 /dev/adf-interface[0-9]*\.[0-9]* u:object_r:graphics_device:s0 /dev/adf-overlay-engine[0-9]*\.[0-9]* u:object_r:graphics_device:s0 -/dev/alarm u:object_r:alarm_device:s0 /dev/ashmem u:object_r:ashmem_device:s0 /dev/audio.* u:object_r:audio_device:s0 /dev/binder u:object_r:binder_device:s0 diff --git a/private/system_server.te b/private/system_server.te index 509876034bc2772981fa87c5d8b430756f29207b..3806d23941cd6110fac5e4e4c3d659d7267bedd5 100644 --- a/private/system_server.te +++ b/private/system_server.te @@ -325,7 +325,6 @@ allow system_server sysfs_usb:file w_file_perms; # Access devices. allow system_server device:dir r_dir_perms; allow system_server mdns_socket:sock_file rw_file_perms; -allow system_server alarm_device:chr_file rw_file_perms; allow system_server gpu_device:chr_file rw_file_perms; allow system_server input_device:dir r_dir_perms; allow system_server input_device:chr_file rw_file_perms; diff --git a/public/device.te b/public/device.te index e55c86d87529d4ad3508e0060a3da9c4e03abea4..57b050304493ae73a035bc13dd8421ccdbd15c4d 100644 --- a/public/device.te +++ b/public/device.te @@ -1,6 +1,5 @@ # Device types type device, dev_type, fs_type; -type alarm_device, dev_type, mlstrustedobject; type ashmem_device, dev_type, mlstrustedobject; type audio_device, dev_type; type binder_device, dev_type, mlstrustedobject; diff --git a/public/domain.te b/public/domain.te index c536c127dec10e6ca58bdd9e4c95c58ede9e2fa5..d0e4e41fe3db8abac6e08afab782940238fcb3c3 100644 --- a/public/domain.te +++ b/public/domain.te @@ -75,7 +75,6 @@ allow { not_full_treble(`allow { domain -hwservicemanager -vndservicemanager } binder_device:chr_file rw_file_perms;') allow { domain -servicemanager -vndservicemanager -isolated_app } hwbinder_device:chr_file rw_file_perms; allow domain ptmx_device:chr_file rw_file_perms; -allow domain alarm_device:chr_file r_file_perms; allow domain random_device:chr_file rw_file_perms; allow domain proc_random:dir r_dir_perms; allow domain proc_random:file r_file_perms; diff --git a/public/hal_telephony.te b/public/hal_telephony.te index 9d0f8c0351e9e9a5a348f6c5109f7045c048516f..3e4b65dface53eca36b1fe474906221d5d02fb73 100644 --- a/public/hal_telephony.te +++ b/public/hal_telephony.te @@ -9,7 +9,6 @@ allowxperm hal_telephony_server self:udp_socket ioctl priv_sock_ioctls; allow hal_telephony_server self:netlink_route_socket nlmsg_write; allow hal_telephony_server kernel:system module_request; allow hal_telephony_server self:global_capability_class_set { setpcap setgid setuid net_admin net_raw }; -allow hal_telephony_server alarm_device:chr_file rw_file_perms; allow hal_telephony_server cgroup:dir create_dir_perms; allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms; allow hal_telephony_server radio_device:chr_file rw_file_perms; diff --git a/public/init.te b/public/init.te index 2a8036a8b5fafc8972ca0b94d3b27ec3dd69d02a..8b95e2b5cfa49849cbed191ac81ad5825df00de1 100644 --- a/public/init.te +++ b/public/init.te @@ -257,7 +257,6 @@ allow init { allow init { fs_type -contextmount_type -sdcard_type -rootfs }:dir { open read setattr search }; allow init { - alarm_device ashmem_device binder_device console_device diff --git a/public/radio.te b/public/radio.te index 05bfd8ce9af1bf8a211172a1bda47375e2d76bc4..8a8bef38615cbb08c988ccd1042a2966ff4aa180 100644 --- a/public/radio.te +++ b/public/radio.te @@ -12,7 +12,6 @@ not_full_treble(`unix_socket_connect(radio, rild, hal_telephony_server)') allow radio radio_data_file:dir create_dir_perms; allow radio radio_data_file:notdevfile_class_set create_file_perms; -allow radio alarm_device:chr_file rw_file_perms; allow radio net_data_file:dir search; allow radio net_data_file:file r_file_perms;