diff options
-rw-r--r-- | gs101-sepolicy.mk | 3 | ||||
-rw-r--r-- | whitechapel/vendor/google/file_contexts | 3 | ||||
-rw-r--r-- | whitechapel/vendor/google/hal_dumpstate_default.te | 4 |
3 files changed, 0 insertions, 10 deletions
diff --git a/gs101-sepolicy.mk b/gs101-sepolicy.mk index d33fcd4..b9bb717 100644 --- a/gs101-sepolicy.mk +++ b/gs101-sepolicy.mk @@ -20,9 +20,6 @@ SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS += device/google/gs101-sepolicy/system_ext/priv # # Pixel-wide # -# Dauntless (uses Citadel policy currently) -BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/citadel - # PowerStats HAL BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/powerstats diff --git a/whitechapel/vendor/google/file_contexts b/whitechapel/vendor/google/file_contexts index da2222b..efdfd82 100644 --- a/whitechapel/vendor/google/file_contexts +++ b/whitechapel/vendor/google/file_contexts @@ -358,9 +358,6 @@ # RILD files /data/vendor/rild(/.*)? u:object_r:rild_vendor_data_file:s0 -# Citadel StrongBox -/dev/gsc0 u:object_r:citadel_device:s0 - # Tetheroffload Service /dev/dit2 u:object_r:vendor_toe_device:s0 /vendor/bin/hw/vendor\.samsung_slsi\.hardware\.tetheroffload@1\.[0-9]-service u:object_r:hal_tetheroffload_default_exec:s0 diff --git a/whitechapel/vendor/google/hal_dumpstate_default.te b/whitechapel/vendor/google/hal_dumpstate_default.te index 28137c7..ad36bd1 100644 --- a/whitechapel/vendor/google/hal_dumpstate_default.te +++ b/whitechapel/vendor/google/hal_dumpstate_default.te @@ -92,10 +92,6 @@ allow hal_dumpstate_default vendor_shell_exec:file execute_no_trans; allow hal_dumpstate_default sysfs_scsi_devices_0000:dir r_dir_perms; allow hal_dumpstate_default sysfs_scsi_devices_0000:file r_file_perms; -allow hal_dumpstate_default citadeld_service:service_manager find; -allow hal_dumpstate_default citadel_updater_exec:file execute_no_trans; -binder_call(hal_dumpstate_default, citadeld); - allow hal_dumpstate_default vendor_displaycolor_service:service_manager find; binder_call(hal_dumpstate_default, hal_graphics_composer_default); allow hal_dumpstate_default sysfs_display:dir r_dir_perms; |