From b5b41d341dd744c40d3908550daaafcee6fe7b4b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Cosme=20Dom=C3=ADnguez=20D=C3=ADaz?= Date: Sun, 29 Apr 2018 02:45:22 +0200 Subject: msm8996-common: sepolicy: Cleanup --- sepolicy/netutils_wrapper.te | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 sepolicy/netutils_wrapper.te (limited to 'sepolicy/netutils_wrapper.te') diff --git a/sepolicy/netutils_wrapper.te b/sepolicy/netutils_wrapper.te deleted file mode 100644 index 963d47b..0000000 --- a/sepolicy/netutils_wrapper.te +++ /dev/null @@ -1,17 +0,0 @@ -# For netutils to be able to write their stdout stderr to the pipes opened by netmgrd -allow netutils_wrapper netmgrd:fd use; -allow netutils_wrapper netmgrd:fifo_file { getattr read write append }; - -# netmgrd opens files without o_CLOEXEC and fork_execs the netutils wrappers -# this results in all file (fd) permissions being audited for access by netutils_wrapper -# domain. Stop those audit messages flooding the kernel log. -dontaudit netutils_wrapper netmgrd:udp_socket { getattr read write append }; -dontaudit netutils_wrapper diag_device:chr_file { getattr read write append ioctl }; -dontaudit netutils_wrapper netmgr_data_file:file { getattr read write append }; -dontaudit netutils_wrapper netmgrd:netlink_route_socket { getattr read write append }; -dontaudit netutils_wrapper netmgrd:netlink_socket { getattr read write append }; -dontaudit netutils_wrapper netmgrd:netlink_xfrm_socket { getattr read write append }; -dontaudit netutils_wrapper netmgrd:unix_stream_socket { getattr read write append }; -dontaudit netutils_wrapper sysfs_msm_subsys:file read; -dontaudit netutils_wrapper netmgrd:tcp_socket { getattr read write append }; -dontaudit netutils_wrapper netmgrd:socket { read write }; -- cgit v1.2.3