diff --git a/private/property_contexts b/private/property_contexts index 498bab8f4890348d76025e6de03e3e602ddc1e4c..4c27b35d6b3d9cadd8853f9d6814fc52e77a7383 100644 --- a/private/property_contexts +++ b/private/property_contexts @@ -57,7 +57,6 @@ persist.sys.audit_safemode u:object_r:safemode_prop:s0 persist.service. u:object_r:system_prop:s0 persist.service.bdroid. u:object_r:bluetooth_prop:s0 persist.security. u:object_r:system_prop:s0 -persist.hal.binderization u:object_r:hal_binderization_prop:s0 persist.vendor.overlay. u:object_r:overlay_prop:s0 ro.boot.vendor.overlay. u:object_r:overlay_prop:s0 ro.boottime. u:object_r:boottime_prop:s0 diff --git a/private/system_app.te b/private/system_app.te index bab49c13d4e4365b4870e1f3817ccb38b8c18b4c..02e6101e4f26d6c5dde7b33ebf1f70415c46ea9f 100644 --- a/private/system_app.te +++ b/private/system_app.te @@ -31,7 +31,6 @@ allow system_app icon_file:file r_file_perms; # Write to properties set_prop(system_app, bluetooth_prop) set_prop(system_app, debug_prop) -set_prop(system_app, hal_binderization_prop) set_prop(system_app, system_prop) set_prop(system_app, logd_prop) set_prop(system_app, net_radio_prop) diff --git a/public/property.te b/public/property.te index 69106036251fb1a14d523aa9c5de1e33b6c9adb1..d6fa8680152157be6f43680be33592e120f47bff 100644 --- a/public/property.te +++ b/public/property.te @@ -44,7 +44,6 @@ type serialno_prop, property_type; type shell_prop, property_type, core_property_type; type system_prop, property_type, core_property_type; type system_radio_prop, property_type, core_property_type; -type hal_binderization_prop, property_type; type vold_prop, property_type, core_property_type; type wifi_log_prop, property_type, log_property_type; type wifi_prop, property_type; diff --git a/public/shell.te b/public/shell.te index 7c3d8a1195dbe30cf442c3dc48cec35c6385c77f..cb1a0867cd1ab4fb0c9369eda52a4b3b744bf7d0 100644 --- a/public/shell.te +++ b/public/shell.te @@ -64,8 +64,6 @@ set_prop(shell, wifi_log_prop) userdebug_or_eng(`set_prop(shell, log_prop)') # logpersist script userdebug_or_eng(`set_prop(shell, logpersistd_logging_prop)') -# hal binderization -userdebug_or_eng(`set_prop(shell, hal_binderization_prop)') userdebug_or_eng(` # "systrace --boot" support - allow boottrace service to run diff --git a/public/te_macros b/public/te_macros index 57a038a23056acc683a2e30e003447002f9114f9..bf75690b2ecd88a39a3784997b176d43150e97d0 100644 --- a/public/te_macros +++ b/public/te_macros @@ -282,13 +282,6 @@ allow hwservicemanager $1:binder { call transfer }; allow hwservicemanager $1:dir search; allow hwservicemanager $1:file { read open }; allow hwservicemanager $1:process getattr; -# TODO(b/34274385): hals wait for data to be mounted so they can -# start only if persist.hal.binderization is enabled. (for dogfood -# stability). getService must also check for data to be mounted -# if the vintf promises the hal will be registered over hwbinder. -get_prop($1, hal_binderization_prop) -get_prop($1, persistent_properties_ready_prop) -get_prop($1, vold_prop) # rw access to /dev/hwbinder and /dev/ashmem is presently granted to # all domains in domain.te. ')