From fb5b13ee31e8fb224608b521fe337458be838b02 Mon Sep 17 00:00:00 2001
From: Christopher Wiley <wiley@google.com>
Date: Fri, 22 Jul 2016 16:34:08 -0700
Subject: [PATCH] Remove WiFi permissions from netd

Bug: 30041228
Test: WiFi tethering, client mode continues to function

Change-Id: I95a583ad4d57642f4731e415abb77732df5289ac
---
 netd.te | 16 ++++------------
 1 file changed, 4 insertions(+), 12 deletions(-)

diff --git a/netd.te b/netd.te
index ff06ac986..976c43d9e 100644
--- a/netd.te
+++ b/netd.te
@@ -38,18 +38,13 @@ r_dir_file(netd, sysfs_type)
 # Allows setting interface MTU
 allow netd sysfs:file write;
 
-# For /sys/modules/bcmdhd/parameters/firmware_path
-allow netd sysfs_wlan_fwpath:file w_file_perms;
-
 # TODO: added to match above sysfs rule. Remove me?
 allow netd sysfs_usb:file write;
 
-# Needed to update /data/misc/wifi/hostapd.conf
-# TODO: See what we can do to reduce the need for
-# these capabilities
-allow netd self:capability { dac_override chown fowner };
-allow netd wifi_data_file:file create_file_perms;
-allow netd wifi_data_file:dir rw_dir_perms;
+# TODO: netd previously thought it needed these permissions to do WiFi related
+#       work.  However, after all the WiFi stuff is gone, we still need them.
+#       Why?
+allow netd self:capability { dac_override chown };
 
 # Needed to update /data/misc/net/rt_tables
 allow netd net_data_file:file create_file_perms;
@@ -81,9 +76,6 @@ allow netd dns_listener_service:service_manager find;
 allow netd netdomain:{tcp_socket udp_socket rawip_socket dccp_socket tun_socket} {read write getattr setattr getopt setopt};
 allow netd netdomain:fd use;
 
-# Allow netd to start and stop hostapd via ctl.start/stop
-set_prop(netd, ctl_default_prop)
-
 ###
 ### Neverallow rules
 ###
-- 
GitLab