From b718e7685ca2bd91962fab565ff5c74fb667f22d Mon Sep 17 00:00:00 2001 From: Adam Shih Date: Mon, 28 Nov 2022 10:07:26 +0800 Subject: [PATCH] restart HALs Bug: 254378739 Test: boot to home Change-Id: Ib88e410c9b7011231a98f096e8cda8ba7332008d --- .../hal_graphics_allocator_default.te | 4 -- .../hal_graphics_composer_default.te | 58 ------------------- .../hal_health_storage_default.te | 3 - legacy/whitechapel_pro/hal_nfc_default.te | 15 ----- .../hal_power_stats_default.te | 20 ------- 5 files changed, 100 deletions(-) delete mode 100644 legacy/whitechapel_pro/hal_graphics_allocator_default.te delete mode 100644 legacy/whitechapel_pro/hal_graphics_composer_default.te delete mode 100644 legacy/whitechapel_pro/hal_health_storage_default.te delete mode 100644 legacy/whitechapel_pro/hal_nfc_default.te delete mode 100644 legacy/whitechapel_pro/hal_power_stats_default.te diff --git a/legacy/whitechapel_pro/hal_graphics_allocator_default.te b/legacy/whitechapel_pro/hal_graphics_allocator_default.te deleted file mode 100644 index 9791dae6..00000000 --- a/legacy/whitechapel_pro/hal_graphics_allocator_default.te +++ /dev/null @@ -1,4 +0,0 @@ -allow hal_graphics_allocator_default sensor_direct_heap_device:chr_file r_file_perms; -allow hal_graphics_allocator_default faceauth_heap_device:chr_file r_file_perms; -allow hal_graphics_allocator_default dmabuf_system_secure_heap_device:chr_file r_file_perms; -allow hal_graphics_allocator_default vscaler_heap_device:chr_file r_file_perms; diff --git a/legacy/whitechapel_pro/hal_graphics_composer_default.te b/legacy/whitechapel_pro/hal_graphics_composer_default.te deleted file mode 100644 index 24966746..00000000 --- a/legacy/whitechapel_pro/hal_graphics_composer_default.te +++ /dev/null @@ -1,58 +0,0 @@ -# allow HWC to access power hal -hal_client_domain(hal_graphics_composer_default, hal_power) - -hal_client_domain(hal_graphics_composer_default, hal_graphics_allocator) - -# allow HWC to access vendor_displaycolor_service -add_service(hal_graphics_composer_default, vendor_displaycolor_service) - -add_service(hal_graphics_composer_default, vendor_surfaceflinger_vndservice) - -add_service(hal_graphics_composer_default, hal_pixel_display_service) - -# access sysfs R/W -allow hal_graphics_composer_default sysfs_display:dir search; -allow hal_graphics_composer_default sysfs_display:file rw_file_perms; - -userdebug_or_eng(` -# allow HWC to access vendor log file - allow hal_graphics_composer_default vendor_log_file:dir create_dir_perms; - allow hal_graphics_composer_default vendor_log_file:file create_file_perms; -# For HWC/libdisplaycolor to generate calibration file. - allow hal_graphics_composer_default persist_display_file:file create_file_perms; - allow hal_graphics_composer_default persist_display_file:dir rw_dir_perms; -') - -# allow HWC/libdisplaycolor to read calibration data -allow hal_graphics_composer_default mnt_vendor_file:dir search; -allow hal_graphics_composer_default persist_file:dir search; -allow hal_graphics_composer_default persist_display_file:file r_file_perms; -allow hal_graphics_composer_default persist_display_file:dir search; - -# allow HWC to r/w backlight -allow hal_graphics_composer_default sysfs_leds:dir r_dir_perms; -allow hal_graphics_composer_default sysfs_leds:file rw_file_perms; - -# allow HWC to get vendor_persist_sys_default_prop -get_prop(hal_graphics_composer_default, vendor_persist_sys_default_prop) - -# allow HWC to get/set vendor_display_prop -set_prop(hal_graphics_composer_default, vendor_display_prop) - -# boot stauts prop -get_prop(hal_graphics_composer_default, boot_status_prop); - -# allow HWC to output to dumpstate via pipe fd -allow hal_graphics_composer_default hal_dumpstate_default:fifo_file { append write }; -allow hal_graphics_composer_default hal_dumpstate_default:fd use; - -# socket / vnd service -allow hal_graphics_composer_default self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; -vndbinder_use(hal_graphics_composer_default) - -# allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags -get_prop(hal_graphics_composer_default, device_config_surface_flinger_native_boot_prop) - -# allow HWC to write log file -allow hal_graphics_composer_default vendor_hwc_log_file:dir rw_dir_perms; -allow hal_graphics_composer_default vendor_hwc_log_file:file create_file_perms; diff --git a/legacy/whitechapel_pro/hal_health_storage_default.te b/legacy/whitechapel_pro/hal_health_storage_default.te deleted file mode 100644 index b780193f..00000000 --- a/legacy/whitechapel_pro/hal_health_storage_default.te +++ /dev/null @@ -1,3 +0,0 @@ -# Access to /sys/devices/platform/13200000.ufs/* -allow hal_health_storage_default sysfs_scsi_devices_0000:dir r_dir_perms; -allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms; diff --git a/legacy/whitechapel_pro/hal_nfc_default.te b/legacy/whitechapel_pro/hal_nfc_default.te deleted file mode 100644 index 247ca3d7..00000000 --- a/legacy/whitechapel_pro/hal_nfc_default.te +++ /dev/null @@ -1,15 +0,0 @@ -# NFC property -set_prop(hal_nfc_default, vendor_nfc_prop) - -# SecureElement property -set_prop(hal_nfc_default, vendor_secure_element_prop) - -# Modem property -set_prop(hal_nfc_default, vendor_modem_prop) - -# Access uwb cal for SecureRanging Applet -allow hal_nfc_default uwb_data_vendor:dir r_dir_perms; -allow hal_nfc_default uwb_data_vendor:file r_file_perms; - -# allow nfc to read uwb calibration file -get_prop(hal_nfc_default, vendor_uwb_calibration_prop) diff --git a/legacy/whitechapel_pro/hal_power_stats_default.te b/legacy/whitechapel_pro/hal_power_stats_default.te deleted file mode 100644 index 501ef328..00000000 --- a/legacy/whitechapel_pro/hal_power_stats_default.te +++ /dev/null @@ -1,20 +0,0 @@ -# allowed to access dislay stats sysfs node -allow hal_power_stats_default sysfs_display:file r_file_perms; - -r_dir_file(hal_power_stats_default, sysfs_aoc) -r_dir_file(hal_power_stats_default, sysfs_aoc_dumpstate) -r_dir_file(hal_power_stats_default, sysfs_acpm_stats) -r_dir_file(hal_power_stats_default, sysfs_cpu) -r_dir_file(hal_power_stats_default, sysfs_iio_devices) -r_dir_file(hal_power_stats_default, sysfs_leds) -r_dir_file(hal_power_stats_default, sysfs_odpm) -r_dir_file(hal_power_stats_default, sysfs_scsi_devices_0000) -r_dir_file(hal_power_stats_default, sysfs_wifi) -r_dir_file(hal_power_stats_default, powerstats_vendor_data_file) - -# Rail selection requires read/write permissions -allow hal_power_stats_default sysfs_odpm:dir search; -allow hal_power_stats_default sysfs_odpm:file rw_file_perms; - -# getStateResidency AIDL callback for Bluetooth HAL -binder_call(hal_power_stats_default, hal_bluetooth_btlinux)