Remove unnecessary sepolicy from cameraserver

All the rules in cameraserver.te are already covered by rules in
hal_camera.te because cameraserver is marked as a client of Camera HAL
in global policy.

Test: Google Camera: take HDR+ photo, take conventional photo,
      record video with sound, record slow motion video with sound,
      confirm videos play back with sound.
Bug: 34170079
Change-Id: I8bac24e3f5b5f89dcc384e0385b16dcd942d8c48
diff --git a/sepolicy/cameraserver.te b/sepolicy/cameraserver.te
deleted file mode 100644
index 9480806..0000000
--- a/sepolicy/cameraserver.te
+++ /dev/null
@@ -1,42 +0,0 @@
-# communicate with perfd
-allow cameraserver perfd_data_file:dir search;
-allow cameraserver perfd:unix_stream_socket connectto;
-allow cameraserver perfd_data_file:sock_file write;
-
-# communicate with camera
-allow cameraserver camera:unix_dgram_socket sendto;
-allow cameraserver camera_data_file:sock_file write;
-allow cameraserver camera_device:chr_file rw_file_perms;
-
-allow cameraserver gpu_device:chr_file rw_file_perms;
-
-# access to /dev/input/event{5,10}
-allow cameraserver input_device:dir r_dir_perms;
-allow cameraserver input_device:chr_file r_file_perms;
-
-set_prop(cameraserver, camera_prop)
-
-allow cameraserver sysfs_enable_ps_sensor:file w_file_perms;
-r_dir_file(cameraserver, sysfs_type)
-# find libraries
-allow cameraserver system_file:dir r_dir_perms;
-
-# talk to system_server
-allow cameraserver system_server:unix_stream_socket { read write };
-
-allow cameraserver sensorservice_service:service_manager find;
-
-allow cameraserver self:socket { create ioctl read write };
-
-# Grant access to Qualcomm MSM Interface (QMI) radio sockets
-qmux_socket(cameraserver)
-
-# allow cameraserver to call some socket ioctls
-allowxperm cameraserver self:socket ioctl { IPC_ROUTER_IOCTL_LOOKUP_SERVER IPC_ROUTER_IOCTL_BIND_CONTROL_PORT };
-
-# ignore spurious denial
-dontaudit cameraserver graphics_device:dir search;
-
-userdebug_or_eng(`
-  allow cameraserver diag_device:chr_file rw_file_perms;
-')