Merge "Remove hal_binderization_prop" am: 1871fc0a88
am: 2261cab6f2
Change-Id: Id44a7c591e8d7640c89e74cb9e88ce7849439c29
This commit is contained in:
commit
484a277c29
5 changed files with 0 additions and 12 deletions
|
@ -57,7 +57,6 @@ persist.sys.audit_safemode u:object_r:safemode_prop:s0
|
|||
persist.service. u:object_r:system_prop:s0
|
||||
persist.service.bdroid. u:object_r:bluetooth_prop:s0
|
||||
persist.security. u:object_r:system_prop:s0
|
||||
persist.hal.binderization u:object_r:hal_binderization_prop:s0
|
||||
persist.vendor.overlay. u:object_r:overlay_prop:s0
|
||||
ro.boot.vendor.overlay. u:object_r:overlay_prop:s0
|
||||
ro.boottime. u:object_r:boottime_prop:s0
|
||||
|
|
|
@ -31,7 +31,6 @@ allow system_app icon_file:file r_file_perms;
|
|||
# Write to properties
|
||||
set_prop(system_app, bluetooth_prop)
|
||||
set_prop(system_app, debug_prop)
|
||||
set_prop(system_app, hal_binderization_prop)
|
||||
set_prop(system_app, system_prop)
|
||||
set_prop(system_app, logd_prop)
|
||||
set_prop(system_app, net_radio_prop)
|
||||
|
|
|
@ -43,7 +43,6 @@ type serialno_prop, property_type;
|
|||
type shell_prop, property_type, core_property_type;
|
||||
type system_prop, property_type, core_property_type;
|
||||
type system_radio_prop, property_type, core_property_type;
|
||||
type hal_binderization_prop, property_type;
|
||||
type vold_prop, property_type, core_property_type;
|
||||
type wifi_log_prop, property_type, log_property_type;
|
||||
type wifi_prop, property_type;
|
||||
|
|
|
@ -64,8 +64,6 @@ set_prop(shell, wifi_log_prop)
|
|||
userdebug_or_eng(`set_prop(shell, log_prop)')
|
||||
# logpersist script
|
||||
userdebug_or_eng(`set_prop(shell, logpersistd_logging_prop)')
|
||||
# hal binderization
|
||||
userdebug_or_eng(`set_prop(shell, hal_binderization_prop)')
|
||||
|
||||
userdebug_or_eng(`
|
||||
# "systrace --boot" support - allow boottrace service to run
|
||||
|
|
|
@ -282,13 +282,6 @@ allow hwservicemanager $1:binder { call transfer };
|
|||
allow hwservicemanager $1:dir search;
|
||||
allow hwservicemanager $1:file { read open };
|
||||
allow hwservicemanager $1:process getattr;
|
||||
# TODO(b/34274385): hals wait for data to be mounted so they can
|
||||
# start only if persist.hal.binderization is enabled. (for dogfood
|
||||
# stability). getService must also check for data to be mounted
|
||||
# if the vintf promises the hal will be registered over hwbinder.
|
||||
get_prop($1, hal_binderization_prop)
|
||||
get_prop($1, persistent_properties_ready_prop)
|
||||
get_prop($1, vold_prop)
|
||||
# rw access to /dev/hwbinder and /dev/ashmem is presently granted to
|
||||
# all domains in domain.te.
|
||||
')
|
||||
|
|
Loading…
Reference in a new issue