diff --git a/system_server.te b/system_server.te
index 4bf59d157f4bde53a7fbe4b42ed402fa33c4b931..66db7f8b4c24b3a1d0eebc6ebdda121f2a89a8b9 100644
--- a/system_server.te
+++ b/system_server.te
@@ -67,9 +67,6 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms;
 # Use generic netlink sockets.
 allow system_server self:netlink_socket create_socket_perms;
 
-# Use generic netlink sockets.
-allow system_server self:netlink_socket create_socket_perms;
-
 # Kill apps.
 allow system_server appdomain:process { sigkill signal };
 
@@ -141,10 +138,6 @@ r_dir_file(system_server, inputflinger)
 allow system_server mediaserver:tcp_socket rw_socket_perms;
 allow system_server mediaserver:udp_socket rw_socket_perms;
 
-# Use sockets received over binder from various services.
-allow system_server mediaserver:tcp_socket rw_socket_perms;
-allow system_server mediaserver:udp_socket rw_socket_perms;
-
 # Check SELinux permissions.
 selinux_check_access(system_server)
 
@@ -312,9 +305,6 @@ allow system_server cache_backup_file:file { relabelto relabelfrom };
 # LocalTransport creates and relabels /cache/backup
 allow system_server cache_backup_file:dir { relabelto relabelfrom create_dir_perms };
 
-# Access SDcard files passed via binder or sockets.
-allow system_server sdcard_type:file { read write getattr };
-
 # Allow system to talk to usb device
 allow system_server usb_device:chr_file rw_file_perms;
 allow system_server usb_device:dir r_dir_perms;