diff --git a/public/gatekeeperd.te b/public/gatekeeperd.te index abecbda24051b9123a2d2f763eb1cf29bd638884..ff369567b6d9c2a548876504f838d1e7fa322055 100644 --- a/public/gatekeeperd.te +++ b/public/gatekeeperd.te @@ -15,7 +15,6 @@ allow gatekeeperd system_file:dir r_dir_perms; ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. ### These rules should eventually be granted only when needed. -hwbinder_use(gatekeeperd) hal_client_domain(gatekeeperd, hal_gatekeeper) ### diff --git a/public/hal_gatekeeper.te b/public/hal_gatekeeper.te index c428ebaf0fdb165726f73f139fe384ba21d6ad4d..618a2ee643256c326e6ace9d6dfc3a8df93eb5e0 100644 --- a/public/hal_gatekeeper.te +++ b/public/hal_gatekeeper.te @@ -1,7 +1,4 @@ -# call into gatekeeperd process (callbacks) -# TODO: This rules is unlikely to be needed because Gatekeeper HIDL -# says there are no callbacks -binder_call(hal_gatekeeper, gatekeeperd) +binder_call(hal_gatekeeper_client, hal_gatekeeper_server) # TEE access. allow hal_gatekeeper tee_device:chr_file rw_file_perms;