summaryrefslogtreecommitdiff
path: root/common
diff options
context:
space:
mode:
authorYu Shan <shanyu@google.com>2022-10-06 17:50:28 -0700
committerYu Shan <shanyu@google.com>2022-10-26 15:18:53 -0700
commit1a06347465beb01ccab38e877154fa87254b555c (patch)
tree21ebe929c1f3a7ff9d2d19f4c957ed64d7335e35 /common
parent847761f5ccef474e193bb0eb677b2d6f5b07f6c0 (diff)
downloadcar-1a06347465beb01ccab38e877154fa87254b555c.tar.gz
Remove unnecessary selinux policy.
The policy to allow remote access HAL register to service manager is added in system/sepolicy at https://r.android.com/2242819 so remove it from gcar specific policy. Test: Manually test on gcar_emu_x86_64 target, verify remote access HAL is running with no selinux issue. Bug: 241483300 Change-Id: Ied51bb83be071bcd712d20c0e7c3b6de8276bc7a Merged-In: Ied51bb83be071bcd712d20c0e7c3b6de8276bc7a
Diffstat (limited to 'common')
-rw-r--r--common/sepolicy/hal_remoteaccess_default.te2
1 files changed, 0 insertions, 2 deletions
diff --git a/common/sepolicy/hal_remoteaccess_default.te b/common/sepolicy/hal_remoteaccess_default.te
index a5475e9..b734334 100644
--- a/common/sepolicy/hal_remoteaccess_default.te
+++ b/common/sepolicy/hal_remoteaccess_default.te
@@ -5,11 +5,9 @@ net_domain(hal_remoteaccess_default)
allow hal_remoteaccess_default self:vsock_socket write;
# Allow accessing VHAL.
-binder_call(hal_remoteaccess_default, servicemanager)
binder_use(hal_remoteaccess_default)
hal_client_domain(hal_remoteaccess_default, hal_vehicle)
# Allow debug dump
allow hal_remoteaccess_default shell:fd use;
allow hal_remoteaccess_default shell:fifo_file write;
-