diff --git a/private/bluetooth.te b/private/bluetooth.te index b0048aa982c71f69dc0217ab2de6ad17229c5e27..d05a21f65b001c0323bfbf169233620cffde6fa4 100644 --- a/private/bluetooth.te +++ b/private/bluetooth.te @@ -49,10 +49,6 @@ allow bluetooth surfaceflinger_service:service_manager find; allow bluetooth app_api_service:service_manager find; allow bluetooth system_api_service:service_manager find; -# TODO(b/36613472): Remove this once bluetooth daemon does not communicate with rild over sockets -# Bluetooth Sim Access Profile Socket to the RIL -unix_socket_connect(bluetooth, sap_uim, rild) - # already open bugreport file descriptors may be shared with # the bluetooth process, from a file in # /data/data/com.android.shell/files/bugreports/bugreport-*. diff --git a/private/file_contexts b/private/file_contexts index 1b618758f4599e278af4f3d4e6b97807c5ed4e54..00d0e4cc38b9c5e5a9b64caeef063d7e46bd4acb 100644 --- a/private/file_contexts +++ b/private/file_contexts @@ -116,7 +116,6 @@ /dev/snd/audio_seq_device u:object_r:audio_seq_device:s0 /dev/socket(/.*)? u:object_r:socket_device:s0 /dev/socket/adbd u:object_r:adbd_socket:s0 -/dev/socket/sap_uim_socket[0-9] u:object_r:sap_uim_socket:s0 /dev/socket/cryptd u:object_r:vold_socket:s0 /dev/socket/dnsproxyd u:object_r:dnsproxyd_socket:s0 /dev/socket/dumpstate u:object_r:dumpstate_socket:s0 diff --git a/private/system_server.te b/private/system_server.te index e9ffa82b86360bfc7821812bea743e0a659a73a1..6f19e38b20d7a728c90e2187854a492fe7c55669 100644 --- a/private/system_server.te +++ b/private/system_server.te @@ -452,9 +452,6 @@ allow system_server gps_control:file rw_file_perms; allow system_server appdomain:{ tcp_socket udp_socket } { getattr getopt setopt read write shutdown }; allow system_server appdomain:{ fifo_file unix_stream_socket } { getattr read write }; -# Allow abstract socket connection -allow system_server rild:unix_stream_socket connectto; - # BackupManagerService needs to manipulate backup data files allow system_server cache_backup_file:dir rw_dir_perms; allow system_server cache_backup_file:file create_file_perms; diff --git a/public/file.te b/public/file.te index f776ef6e5e63a29ca4e7c3c7bc7a20f6e85ea9e0..0ee1500ad9ee6ed18b192d46dc7e236a660f2bea 100644 --- a/public/file.te +++ b/public/file.te @@ -254,7 +254,6 @@ type vold_socket, file_type, coredomain_socket; type webview_zygote_socket, file_type, coredomain_socket; type wpa_socket, file_type; type zygote_socket, file_type, coredomain_socket; -type sap_uim_socket, file_type; # UART (for GPS) control proc file type gps_control, file_type; diff --git a/public/mediaserver.te b/public/mediaserver.te index e9aa421f6687dbd25f9ccc42f58ca76428a762d8..01cc4d8c793f22d3f1ca62bf15f17779a33b68f2 100644 --- a/public/mediaserver.te +++ b/public/mediaserver.te @@ -67,9 +67,6 @@ allow mediaserver app_fuse_file:file { read getattr }; allow mediaserver qtaguid_proc:file rw_file_perms; allow mediaserver qtaguid_device:chr_file r_file_perms; -# Allow abstract socket connection -allow mediaserver rild:unix_stream_socket { connectto read write setopt }; - # Needed on some devices for playing DRM protected content, # but seems expected and appropriate for all devices. unix_socket_connect(mediaserver, drmserver, drmserver)