aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/netmgrd.te
diff options
context:
space:
mode:
authorCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-04-29 02:45:22 +0200
committerCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-05-02 23:46:36 +0200
commitb5b41d341dd744c40d3908550daaafcee6fe7b4b (patch)
tree3c13b9ed2d88a4b15eefb61339152a42eda3104a /sepolicy/netmgrd.te
parent008f0bb54500d59599f1b61522dc8ac75bfd2e5c (diff)
msm8996-common: sepolicy: Cleanup
Diffstat (limited to 'sepolicy/netmgrd.te')
-rw-r--r--sepolicy/netmgrd.te59
1 files changed, 4 insertions, 55 deletions
diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te
index c7ed94d..933aa83 100644
--- a/sepolicy/netmgrd.te
+++ b/sepolicy/netmgrd.te
@@ -1,55 +1,4 @@
-net_domain(netmgrd)
-
-# Grant access to Qualcomm MSM Interface (QMI) radio sockets
-qmux_socket(netmgrd)
-
-wakelock_use(netmgrd)
-
-# create socket in /dev/socket/netmgrd/
-allow netmgrd netmgrd_socket:dir rw_dir_perms;
-allow netmgrd netmgrd_socket:sock_file create_file_perms;
-
-# communicate with netd
-unix_socket_connect(netmgrd, netd, netd)
-
-allow netmgrd proc_net:file rw_file_perms;
-
-allow netmgrd self:capability { net_admin net_raw setgid setpcap setuid };
-
-# read /data/misc/net
-allow netmgrd net_data_file:dir r_dir_perms;
-allow netmgrd net_data_file:file r_file_perms;
-# read and write /data/misc/netmgr
-userdebug_or_eng(`
- allow netmgrd netmgr_data_file:dir rw_dir_perms;
- allow netmgrd netmgr_data_file:file create_file_perms;
-')
-
-# execute shell, ip, and toolbox
-allow netmgrd vendor_shell_exec:file rx_file_perms;
-allow netmgrd vendor_toolbox_exec:file rx_file_perms;
-
-# netmgrd sockets
-allow netmgrd self:netlink_route_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write };
-allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
-allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write };
-allow netmgrd self:rawip_socket create_socket_perms_no_ioctl;
-allow netmgrd self:socket create_socket_perms;
-# in addition to ioctl commands granted to domain allow netmgrd to use:
-allowxperm netmgrd self:udp_socket ioctl priv_sock_ioctls;
-allowxperm netmgrd self:socket ioctl msm_sock_ipc_ioctls;
-
-set_prop(netmgrd, net_radio_prop)
-
-# read files in /sys
-r_dir_file(netmgrd, sysfs_type)
-allow netmgrd sysfs_net:file write;
-
-userdebug_or_eng(`
- allow netmgrd diag_device:chr_file rw_file_perms;
-')
-
-# For netmgrd to be able to execute netutils wrappers
-domain_trans(netmgrd, netutils_wrapper_exec, netutils_wrapper)
-allow netmgrd netutils_wrapper_exec:file { open read getattr execute };
-allow netmgrd netutils_wrapper:process sigkill;
+allow netmgrd sysfs_msm_subsys:dir search;
+allow netmgrd sysfs_net:dir search;
+allow netmgrd sysfs_net:file rw_file_perms;
+allow netmgrd sysfs_soc:dir search;