reuse gs101 confirmation UI

Bug: 196916111
Test: boot with confirmation UI started
Change-Id: I39ff3c0eecb017bb78118a1f7b42c8ce87eda971
This commit is contained in:
Adam Shih 2021-08-18 12:59:29 +08:00
parent 6dc0391fab
commit 5656f81f62
4 changed files with 0 additions and 25 deletions

View file

@ -15,7 +15,6 @@ type vendor_secmem_device, dev_type;
type vendor_toe_device, dev_type;
type custom_ab_block_device, dev_type;
type devinfo_block_device, dev_type;
type tui_device, dev_type;
# usbpd
type logbuffer_device, dev_type;

View file

@ -89,7 +89,6 @@
/dev/g2d u:object_r:graphics_device:s0
/dev/tsmux u:object_r:video_device:s0
/dev/repeater u:object_r:video_device:s0
/dev/tui-driver u:object_r:tui_device:s0
/dev/logbuffer_usbpd u:object_r:logbuffer_device:s0
/dev/logbuffer_ssoc u:object_r:logbuffer_device:s0
/dev/logbuffer_wireless u:object_r:logbuffer_device:s0
@ -306,7 +305,6 @@
/vendor/bin/trusty_metricsd u:object_r:trusty_metricsd_exec:s0
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service\.trusty u:object_r:hal_gatekeeper_default_exec:s0
/vendor/bin/hw/android\.hardware\.security\.keymint-service\.trusty u:object_r:hal_keymint_default_exec:s0
/vendor/bin/hw/android\.hardware\.confirmationui@1\.0-service\.trusty\.vendor u:object_r:hal_confirmationui_default_exec:s0
/dev/trusty-ipc-dev0 u:object_r:tee_device:s0
/data/vendor/ss(/.*)? u:object_r:tee_data_file:s0
/mnt/vendor/persist/ss(/.*)? u:object_r:tee_data_file:s0

View file

@ -1,13 +0,0 @@
allow hal_confirmationui_default tee_device:chr_file rw_file_perms;
binder_call(hal_confirmationui_default, keystore)
vndbinder_use(hal_confirmationui_default)
binder_call(hal_confirmationui_default, citadeld)
allow hal_confirmationui_default citadeld_service:service_manager find;
allow hal_confirmationui_default input_device:chr_file rw_file_perms;
allow hal_confirmationui_default input_device:dir r_dir_perms;
allow hal_confirmationui_default dmabuf_system_heap_device:chr_file r_file_perms;
allow hal_confirmationui_default ion_device:chr_file r_file_perms;

View file

@ -1,9 +0,0 @@
type securedpud_slider, domain;
type securedpud_slider_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(securedpud_slider)
allow securedpud_slider dmabuf_heap_device:chr_file r_file_perms;
allow securedpud_slider ion_device:chr_file r_file_perms;
allow securedpud_slider tee_device:chr_file rw_file_perms;
allow securedpud_slider tui_device:chr_file rw_file_perms;