review trusty domains
Bug: 198723116 Test: boot to home with trusty domains started Change-Id: If5c6c0a75b6ad0eb032f637fd51ab2e4cea1e389
This commit is contained in:
parent
34693feadc
commit
a787a30f8d
4 changed files with 2 additions and 2 deletions
|
@ -126,8 +126,6 @@
|
|||
|
||||
# Trusty
|
||||
/vendor/bin/securedpud.slider u:object_r:securedpud_slider_exec:s0
|
||||
/vendor/bin/trusty_apploader u:object_r:trusty_apploader_exec:s0
|
||||
/vendor/bin/trusty_metricsd u:object_r:trusty_metricsd_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service\.trusty u:object_r:hal_gatekeeper_default_exec:s0
|
||||
/vendor/bin/hw/android\.hardware\.security\.keymint-service\.trusty u:object_r:hal_keymint_default_exec:s0
|
||||
/dev/trusty-log0 u:object_r:logbuffer_device:s0
|
||||
|
|
|
@ -1,7 +0,0 @@
|
|||
type trusty_apploader, domain;
|
||||
type trusty_apploader_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(trusty_apploader)
|
||||
|
||||
allow trusty_apploader ion_device:chr_file r_file_perms;
|
||||
allow trusty_apploader tee_device:chr_file rw_file_perms;
|
||||
allow trusty_apploader dmabuf_system_heap_device:chr_file r_file_perms;
|
|
@ -1,11 +0,0 @@
|
|||
type trusty_metricsd, domain;
|
||||
type trusty_metricsd_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
init_daemon_domain(trusty_metricsd)
|
||||
|
||||
allow trusty_metricsd tee_device:chr_file rw_file_perms;
|
||||
|
||||
# For Suez metrics collection
|
||||
binder_use(trusty_metricsd)
|
||||
binder_call(trusty_metricsd, system_server)
|
||||
allow trusty_metricsd fwk_stats_service:service_manager find;
|
Loading…
Add table
Add a link
Reference in a new issue