reuse gs101 confirmation UI
Bug: 196916111 Test: boot with confirmation UI started Change-Id: I39ff3c0eecb017bb78118a1f7b42c8ce87eda971
This commit is contained in:
parent
6dc0391fab
commit
5656f81f62
4 changed files with 0 additions and 25 deletions
|
@ -15,7 +15,6 @@ type vendor_secmem_device, dev_type;
|
|||
type vendor_toe_device, dev_type;
|
||||
type custom_ab_block_device, dev_type;
|
||||
type devinfo_block_device, dev_type;
|
||||
type tui_device, dev_type;
|
||||
|
||||
# usbpd
|
||||
type logbuffer_device, dev_type;
|
||||
|
|
|
@ -89,7 +89,6 @@
|
|||
/dev/g2d u:object_r:graphics_device:s0
|
||||
/dev/tsmux u:object_r:video_device:s0
|
||||
/dev/repeater u:object_r:video_device:s0
|
||||
/dev/tui-driver u:object_r:tui_device:s0
|
||||
/dev/logbuffer_usbpd u:object_r:logbuffer_device:s0
|
||||
/dev/logbuffer_ssoc u:object_r:logbuffer_device:s0
|
||||
/dev/logbuffer_wireless u:object_r:logbuffer_device:s0
|
||||
|
@ -306,7 +305,6 @@
|
|||
/vendor/bin/trusty_metricsd u:object_r:trusty_metricsd_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service\.trusty u:object_r:hal_gatekeeper_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.security\.keymint-service\.trusty u:object_r:hal_keymint_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.confirmationui@1\.0-service\.trusty\.vendor u:object_r:hal_confirmationui_default_exec:s0
|
||||
/dev/trusty-ipc-dev0 u:object_r:tee_device:s0
|
||||
/data/vendor/ss(/.*)? u:object_r:tee_data_file:s0
|
||||
/mnt/vendor/persist/ss(/.*)? u:object_r:tee_data_file:s0
|
||||
|
|
|
@ -1,13 +0,0 @@
|
|||
allow hal_confirmationui_default tee_device:chr_file rw_file_perms;
|
||||
|
||||
binder_call(hal_confirmationui_default, keystore)
|
||||
|
||||
vndbinder_use(hal_confirmationui_default)
|
||||
binder_call(hal_confirmationui_default, citadeld)
|
||||
allow hal_confirmationui_default citadeld_service:service_manager find;
|
||||
|
||||
allow hal_confirmationui_default input_device:chr_file rw_file_perms;
|
||||
allow hal_confirmationui_default input_device:dir r_dir_perms;
|
||||
|
||||
allow hal_confirmationui_default dmabuf_system_heap_device:chr_file r_file_perms;
|
||||
allow hal_confirmationui_default ion_device:chr_file r_file_perms;
|
|
@ -1,9 +0,0 @@
|
|||
type securedpud_slider, domain;
|
||||
type securedpud_slider_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
init_daemon_domain(securedpud_slider)
|
||||
|
||||
allow securedpud_slider dmabuf_heap_device:chr_file r_file_perms;
|
||||
allow securedpud_slider ion_device:chr_file r_file_perms;
|
||||
allow securedpud_slider tee_device:chr_file rw_file_perms;
|
||||
allow securedpud_slider tui_device:chr_file rw_file_perms;
|
Loading…
Add table
Add a link
Reference in a new issue