diff --git a/system_server.te b/system_server.te index 4bf59d157f4bde53a7fbe4b42ed402fa33c4b931..66db7f8b4c24b3a1d0eebc6ebdda121f2a89a8b9 100644 --- a/system_server.te +++ b/system_server.te @@ -67,9 +67,6 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms; # Use generic netlink sockets. allow system_server self:netlink_socket create_socket_perms; -# Use generic netlink sockets. -allow system_server self:netlink_socket create_socket_perms; - # Kill apps. allow system_server appdomain:process { sigkill signal }; @@ -141,10 +138,6 @@ r_dir_file(system_server, inputflinger) allow system_server mediaserver:tcp_socket rw_socket_perms; allow system_server mediaserver:udp_socket rw_socket_perms; -# Use sockets received over binder from various services. -allow system_server mediaserver:tcp_socket rw_socket_perms; -allow system_server mediaserver:udp_socket rw_socket_perms; - # Check SELinux permissions. selinux_check_access(system_server) @@ -312,9 +305,6 @@ allow system_server cache_backup_file:file { relabelto relabelfrom }; # LocalTransport creates and relabels /cache/backup allow system_server cache_backup_file:dir { relabelto relabelfrom create_dir_perms }; -# Access SDcard files passed via binder or sockets. -allow system_server sdcard_type:file { read write getattr }; - # Allow system to talk to usb device allow system_server usb_device:chr_file rw_file_perms; allow system_server usb_device:dir r_dir_perms;