diff options
author | Yu Shan <shanyu@google.com> | 2022-10-06 17:50:28 -0700 |
---|---|---|
committer | Yu Shan <shanyu@google.com> | 2022-10-26 15:18:53 -0700 |
commit | 1a06347465beb01ccab38e877154fa87254b555c (patch) | |
tree | 21ebe929c1f3a7ff9d2d19f4c957ed64d7335e35 /common | |
parent | 847761f5ccef474e193bb0eb677b2d6f5b07f6c0 (diff) | |
download | car-1a06347465beb01ccab38e877154fa87254b555c.tar.gz |
Remove unnecessary selinux policy.
The policy to allow remote access HAL register to service manager
is added in system/sepolicy at https://r.android.com/2242819 so
remove it from gcar specific policy.
Test: Manually test on gcar_emu_x86_64 target, verify remote access
HAL is running with no selinux issue.
Bug: 241483300
Change-Id: Ied51bb83be071bcd712d20c0e7c3b6de8276bc7a
Merged-In: Ied51bb83be071bcd712d20c0e7c3b6de8276bc7a
Diffstat (limited to 'common')
-rw-r--r-- | common/sepolicy/hal_remoteaccess_default.te | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/common/sepolicy/hal_remoteaccess_default.te b/common/sepolicy/hal_remoteaccess_default.te index a5475e9..b734334 100644 --- a/common/sepolicy/hal_remoteaccess_default.te +++ b/common/sepolicy/hal_remoteaccess_default.te @@ -5,11 +5,9 @@ net_domain(hal_remoteaccess_default) allow hal_remoteaccess_default self:vsock_socket write; # Allow accessing VHAL. -binder_call(hal_remoteaccess_default, servicemanager) binder_use(hal_remoteaccess_default) hal_client_domain(hal_remoteaccess_default, hal_vehicle) # Allow debug dump allow hal_remoteaccess_default shell:fd use; allow hal_remoteaccess_default shell:fifo_file write; - |