diff --git a/private/untrusted_app_all.te b/private/untrusted_app_all.te index 11cea6ea2baf434ea2e9fc65cefccdd73a0ef6a9..32eec26dfdbb50e7994eb02f9600bf6fb1c1dbe2 100644 --- a/private/untrusted_app_all.te +++ b/private/untrusted_app_all.te @@ -135,18 +135,6 @@ dontaudit untrusted_app_all proc_uptime:file read; # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm create_pty(untrusted_app_all) -# /proc/net access. -# TODO(b/9496886) Audit access for removal. -# VPN apps require access to /proc/net/{tcp,udp} so access will need to be -# limited through a mechanism other than SELinux. -r_dir_file(untrusted_app_all, proc_net_type) -userdebug_or_eng(` - auditallow untrusted_app_all { - proc_net_type - -proc_net_vpn - }:{ dir file lnk_file } { getattr open read }; -') - # Attempts to write to system_data_file is generally a sign # that apps are attempting to access encrypted storage before # the ACTION_USER_UNLOCKED intent is delivered. Suppress this