sepolicy_vndr: Allow hal_wifi to write into tombstone on user variants

Remove the case when the hal_wifi is allowed to write
on tombstone in case of userdebug only mode.

Change-Id: I1a31094c1d3635690473659310551b4853e2d468
CRs-Fixed: 3662698
diff --git a/generic/vendor/common/hal_wifi.te b/generic/vendor/common/hal_wifi.te
index db94262..3f87dc0 100644
--- a/generic/vendor/common/hal_wifi.te
+++ b/generic/vendor/common/hal_wifi.te
@@ -56,10 +56,8 @@
 allow hal_wifi proc_net:file write;
 
 # allow hal_wifi to write into /data/vendor/tombstones/wifi
-userdebug_or_eng(`
-  allow hal_wifi_server vendor_tombstone_data_file:dir rw_dir_perms;
-  allow hal_wifi_server vendor_tombstone_data_file:file create_file_perms;
-')
+allow hal_wifi_server vendor_tombstone_data_file:dir rw_dir_perms;
+allow hal_wifi_server vendor_tombstone_data_file:file create_file_perms;
 
 # allow hal_wifi to operate on bridged interfaces
 allowxperm hal_wifi_default self:udp_socket ioctl { SIOCBRADDBR