aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/netutils_wrapper.te
diff options
context:
space:
mode:
authorCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-04-29 02:45:22 +0200
committerCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-05-02 23:46:36 +0200
commitb5b41d341dd744c40d3908550daaafcee6fe7b4b (patch)
tree3c13b9ed2d88a4b15eefb61339152a42eda3104a /sepolicy/netutils_wrapper.te
parent008f0bb54500d59599f1b61522dc8ac75bfd2e5c (diff)
msm8996-common: sepolicy: Cleanup
Diffstat (limited to 'sepolicy/netutils_wrapper.te')
-rw-r--r--sepolicy/netutils_wrapper.te17
1 files changed, 0 insertions, 17 deletions
diff --git a/sepolicy/netutils_wrapper.te b/sepolicy/netutils_wrapper.te
deleted file mode 100644
index 963d47b..0000000
--- a/sepolicy/netutils_wrapper.te
+++ /dev/null
@@ -1,17 +0,0 @@
-# For netutils to be able to write their stdout stderr to the pipes opened by netmgrd
-allow netutils_wrapper netmgrd:fd use;
-allow netutils_wrapper netmgrd:fifo_file { getattr read write append };
-
-# netmgrd opens files without o_CLOEXEC and fork_execs the netutils wrappers
-# this results in all file (fd) permissions being audited for access by netutils_wrapper
-# domain. Stop those audit messages flooding the kernel log.
-dontaudit netutils_wrapper netmgrd:udp_socket { getattr read write append };
-dontaudit netutils_wrapper diag_device:chr_file { getattr read write append ioctl };
-dontaudit netutils_wrapper netmgr_data_file:file { getattr read write append };
-dontaudit netutils_wrapper netmgrd:netlink_route_socket { getattr read write append };
-dontaudit netutils_wrapper netmgrd:netlink_socket { getattr read write append };
-dontaudit netutils_wrapper netmgrd:netlink_xfrm_socket { getattr read write append };
-dontaudit netutils_wrapper netmgrd:unix_stream_socket { getattr read write append };
-dontaudit netutils_wrapper sysfs_msm_subsys:file read;
-dontaudit netutils_wrapper netmgrd:tcp_socket { getattr read write append };
-dontaudit netutils_wrapper netmgrd:socket { read write };