diff --git a/rootdir/etc/init.qcom.rc b/rootdir/etc/init.qcom.rc index 9a5fcfc..aa9437b 100644 --- a/rootdir/etc/init.qcom.rc +++ b/rootdir/etc/init.qcom.rc @@ -74,11 +74,6 @@ on post-fs chmod 0660 /sys/class/leds/red/brightness chown system system /sys/class/leds/red/brightness - mkdir /mnt/vendor/dsp 0770 root root - copy /vendor/dsp/cdsp/fastrpc_shell_3 /mnt/vendor/dsp/fastrpc_shell_3 - chmod 0644 /mnt/vendor/dsp/fastrpc_shell_3 - mount none /mnt/vendor/dsp/fastrpc_shell_3 /vendor/dsp/cdsp/fastrpc_shell_3 bind - on early-boot # set RLIMIT_MEMLOCK to 64MB setrlimit 8 67108864 67108864 diff --git a/sepolicy/vendor/adsprpcd.te b/sepolicy/vendor/adsprpcd.te index 5227744..58fe3e7 100644 --- a/sepolicy/vendor/adsprpcd.te +++ b/sepolicy/vendor/adsprpcd.te @@ -1,2 +1 @@ -r_dir_file(vendor_adsprpcd, public_adsprpcd_file) r_dir_file(vendor_adsprpcd, vendor_sysfs_graphics) diff --git a/sepolicy/vendor/app.te b/sepolicy/vendor/app.te index 7cf5cde..23e2e3d 100644 --- a/sepolicy/vendor/app.te +++ b/sepolicy/vendor/app.te @@ -1,5 +1,3 @@ -allow { appdomain -isolated_app } adsprpcd_file:dir r_dir_perms; -allow { appdomain -isolated_app } public_adsprpcd_file:file r_file_perms; allow { appdomain -isolated_app } vendor_xdsp_device:chr_file r_file_perms; get_prop({ appdomain -isolated_app }, vendor_fingerprint_prop) diff --git a/sepolicy/vendor/cdsprpcd.te b/sepolicy/vendor/cdsprpcd.te deleted file mode 100644 index cead8a9..0000000 --- a/sepolicy/vendor/cdsprpcd.te +++ /dev/null @@ -1 +0,0 @@ -r_dir_file(vendor_cdsprpcd, public_adsprpcd_file) diff --git a/sepolicy/vendor/file.te b/sepolicy/vendor/file.te index 2dc5e24..ddec8cd 100644 --- a/sepolicy/vendor/file.te +++ b/sepolicy/vendor/file.te @@ -6,8 +6,6 @@ type fingerprint_data_file, data_file_type, core_data_file_type, file_type; type persist_subsys_file, vendor_persist_type, file_type; -type public_adsprpcd_file, file_type; - type sysfs_msm_boot, fs_type, sysfs_type; type sysfs_msm_subsys, sysfs_type, fs_type; diff --git a/sepolicy/vendor/file_contexts b/sepolicy/vendor/file_contexts index e382555..b96736a 100644 --- a/sepolicy/vendor/file_contexts +++ b/sepolicy/vendor/file_contexts @@ -17,11 +17,6 @@ /data/vendor/goodix(/.*)? u:object_r:fingerprint_vendor_data_file:s0 /data/vendor/fpc(/.*)? u:object_r:fingerprint_vendor_data_file:s0 -# Hexagon DSP-side executable needed for Halide operation -# This is labeled as public_adsprpcd_file as it needs to be read by apps -# (e.g. Google Camera App) -/mnt/vendor/dsp/fastrpc_shell_3 u:object_r:public_adsprpcd_file:s0 - # IR /dev/spidev0.1 u:object_r:lirc_device:s0 diff --git a/sepolicy/vendor/hal_camera_default.te b/sepolicy/vendor/hal_camera_default.te index 892d7ec..b2f6226 100644 --- a/sepolicy/vendor/hal_camera_default.te +++ b/sepolicy/vendor/hal_camera_default.te @@ -16,5 +16,4 @@ set_prop(hal_camera_default, vendor_camera_prop) allow hal_camera_default socket_device:sock_file write; allow hal_camera_default proc_stat:file { open }; -allow hal_camera_default public_adsprpcd_file:file r_file_perms; allow hal_camera_default vendor_xdsp_device:chr_file r_file_perms; diff --git a/sepolicy/vendor/hal_neuralnetworks_default.te b/sepolicy/vendor/hal_neuralnetworks_default.te index 7dfa669..2e81a1c 100644 --- a/sepolicy/vendor/hal_neuralnetworks_default.te +++ b/sepolicy/vendor/hal_neuralnetworks_default.te @@ -1,3 +1 @@ -r_dir_file(vendor_hal_neuralnetworks_default, public_adsprpcd_file) - get_prop(vendor_hal_neuralnetworks_default, vendor_adsprpc_prop) diff --git a/sepolicy/vendor/init.te b/sepolicy/vendor/init.te index 8b97871..a49844e 100644 --- a/sepolicy/vendor/init.te +++ b/sepolicy/vendor/init.te @@ -1,3 +1 @@ allow init same_process_hal_file:file execute; - -allow init adsprpcd_file:file mounton;