a85558ea52
This makes sure that the remaining binder services for radio end up in plat_service_contexts. That in turn allows us to enforce that servicemanager will only serve services from plat_service_contexts on FULL_TREBLE devices. Bug: 36866029 Test: boot, verify radio services still work Change-Id: Ib67b3a03e5599484c5c4fb27a0f323a37dd51636 Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
27 lines
1.1 KiB
Text
27 lines
1.1 KiB
Text
type hal_fingerprint_msm8937, domain, binder_in_vendor_violators;
|
|
hal_server_domain(hal_fingerprint_msm8937, hal_fingerprint)
|
|
|
|
type hal_fingerprint_msm8937_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_fingerprint_msm8937)
|
|
|
|
binder_use(hal_fingerprint_msm8937)
|
|
add_service(hal_fingerprint_msm8937, hal_fingerprint_msm8937_service)
|
|
binder_call(hal_fingerprint_msm8937, gx_fpd)
|
|
|
|
allow hal_fingerprint_msm8937 gx_fpd_service:service_manager find;
|
|
|
|
allow gx_fpd hal_fingerprint_msm8937:binder call;
|
|
|
|
allow hal_fingerprint_msm8937 fingerprint_service:service_manager find;
|
|
allow hal_fingerprint_msm8937 keystore_service:service_manager find;
|
|
|
|
allow hal_fingerprint_msm8937 fpc_sysfs:file rw_file_perms;
|
|
allow hal_fingerprint_msm8937 fpc_sysfs:dir rw_dir_perms;
|
|
allow hal_fingerprint_msm8937 tee_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_msm8937 uhid_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_msm8937 fpc_data_file:dir rw_dir_perms;
|
|
allow hal_fingerprint_msm8937 fpc_data_file:sock_file create_file_perms;
|
|
|
|
r_dir_file(hal_fingerprint_msm8937, firmware_file)
|
|
|
|
use_keystore(hal_fingerprint_msm8937)
|