Remove bufferhub HAL policy.
The bufferhub daemon policy still remains, since it still needs to be deleted. However, since the HAL no longer exists, removing policy related to this. Bug: 204068144 Test: build only Change-Id: I96b96c77a39e2ba2024680ebaf3067283d0cfc65
This commit is contained in:
parent
48732e041c
commit
cc7de177ec
5 changed files with 0 additions and 12 deletions
|
@ -4,5 +4,4 @@ type fwk_bufferhub_exec, system_file_type, exec_type, file_type;
|
||||||
hal_client_domain(fwk_bufferhub, hal_graphics_allocator)
|
hal_client_domain(fwk_bufferhub, hal_graphics_allocator)
|
||||||
allow fwk_bufferhub ion_device:chr_file r_file_perms;
|
allow fwk_bufferhub ion_device:chr_file r_file_perms;
|
||||||
|
|
||||||
hal_server_domain(fwk_bufferhub, hal_bufferhub)
|
|
||||||
init_daemon_domain(fwk_bufferhub)
|
init_daemon_domain(fwk_bufferhub)
|
||||||
|
|
|
@ -19,7 +19,6 @@ hal_client_domain(surfaceflinger, hal_codec2)
|
||||||
hal_client_domain(surfaceflinger, hal_omx)
|
hal_client_domain(surfaceflinger, hal_omx)
|
||||||
hal_client_domain(surfaceflinger, hal_configstore)
|
hal_client_domain(surfaceflinger, hal_configstore)
|
||||||
hal_client_domain(surfaceflinger, hal_power)
|
hal_client_domain(surfaceflinger, hal_power)
|
||||||
hal_client_domain(surfaceflinger, hal_bufferhub)
|
|
||||||
allow surfaceflinger hidl_token_hwservice:hwservice_manager find;
|
allow surfaceflinger hidl_token_hwservice:hwservice_manager find;
|
||||||
|
|
||||||
# Perform Binder IPC.
|
# Perform Binder IPC.
|
||||||
|
|
|
@ -59,11 +59,6 @@
|
||||||
(typeattribute untrusted_app_visible_halserver)
|
(typeattribute untrusted_app_visible_halserver)
|
||||||
(typeattributeset untrusted_app_visible_halserver_violators (untrusted_app_visible_halserver))
|
(typeattributeset untrusted_app_visible_halserver_violators (untrusted_app_visible_halserver))
|
||||||
|
|
||||||
; Apps, except isolated apps, are clients of BufferHub HAL
|
|
||||||
; Unfortunately, we can't currently express this in module policy language:
|
|
||||||
; typeattribute { appdomain -isolated_app } hal_cas_client;
|
|
||||||
(typeattributeset hal_bufferhub_client ((and (appdomain) ((not (isolated_app))))))
|
|
||||||
|
|
||||||
; Properties having both system_property_type and vendor_property_type are illegal
|
; Properties having both system_property_type and vendor_property_type are illegal
|
||||||
; Unfortunately, we can't currently express this in module policy language:
|
; Unfortunately, we can't currently express this in module policy language:
|
||||||
; typeattribute { system_property_type && vendor_property_type } system_and_vendor_property_type;
|
; typeattribute { system_property_type && vendor_property_type } system_and_vendor_property_type;
|
||||||
|
|
|
@ -324,7 +324,6 @@ hal_attribute(audiocontrol);
|
||||||
hal_attribute(authsecret);
|
hal_attribute(authsecret);
|
||||||
hal_attribute(bluetooth);
|
hal_attribute(bluetooth);
|
||||||
hal_attribute(bootctl);
|
hal_attribute(bootctl);
|
||||||
hal_attribute(bufferhub);
|
|
||||||
hal_attribute(broadcastradio);
|
hal_attribute(broadcastradio);
|
||||||
hal_attribute(camera);
|
hal_attribute(camera);
|
||||||
hal_attribute(can_bus);
|
hal_attribute(can_bus);
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
binder_call(hal_bufferhub_client, hal_bufferhub_server)
|
|
||||||
binder_call(hal_bufferhub_server, hal_bufferhub_client)
|
|
||||||
|
|
||||||
hal_attribute_hwservice(hal_bufferhub, fwk_bufferhub_hwservice)
|
|
Loading…
Reference in a new issue