diff --git a/private/wificond.te b/private/wificond.te index b9e48b2b50a234f0bb47a859e77d1af126024d15..5476e33858dc85e21afeeec385417fb51d03bde1 100644 --- a/private/wificond.te +++ b/private/wificond.te @@ -1,6 +1,3 @@ typeattribute wificond coredomain; init_daemon_domain(wificond) - -# TODO(b/36790991): Remove this once wificond is no longer permitted to touch wpa sockets -typeattribute wificond socket_between_core_and_vendor_violators; diff --git a/public/wificond.te b/public/wificond.te index dd22d26b12a9792c9e4342819b6b89fe472c44f2..73b4be18d67c22118bc64f9931186cad604625a5 100644 --- a/public/wificond.te +++ b/public/wificond.te @@ -7,10 +7,6 @@ binder_call(wificond, system_server) add_service(wificond, wificond_service) -# wificond writes firmware paths to this file. -# wificond also changes the owership of this file on startup. -allow wificond sysfs_wlan_fwpath:file { w_file_perms setattr }; - set_prop(wificond, wifi_prop) set_prop(wificond, ctl_default_prop) @@ -35,11 +31,6 @@ allow wificond wifi_data_file:file create_file_perms; # wificond changes the ownership of some files before dropping root allow wificond self:capability { setuid setgid setpcap chown }; -# wificond cleans up sockets created by wpa_supplicant and framework -allow wificond wpa_socket:dir rw_dir_perms; -allow wificond system_wpa_socket:sock_file unlink; -allow wificond wpa_socket:sock_file unlink; - # dumpstate support allow wificond dumpstate:fd use; allow wificond dumpstate:fifo_file write;