mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
netmgrd: remove access to system_file type.
Bug: 111243627 Test: go/sedenials shows that netmgrd does not access system_file on wahoo Change-Id: Id9c0e3439a89a233f9359fde4ab0b305005b7a19
This commit is contained in:
9
sepolicy/vendor/netmgrd.te
vendored
9
sepolicy/vendor/netmgrd.te
vendored
@@ -27,11 +27,6 @@ allow netmgrd sysfs_soc:file r_file_perms;
|
||||
allow netmgrd sysfs_msm_subsys:dir r_dir_perms;
|
||||
allow netmgrd sysfs_msm_subsys:file r_file_perms;
|
||||
|
||||
allow netmgrd system_file:file lock;
|
||||
# TODO(b/111243627): Expose required system components via separate types once
|
||||
# we have enough information about what is needed by netmgrd.
|
||||
auditallow netmgrd system_file:file lock;
|
||||
|
||||
r_dir_file(netmgrd, sysfs_msm_subsys)
|
||||
|
||||
wakelock_use(netmgrd)
|
||||
@@ -54,10 +49,6 @@ dontaudit netmgrd kernel:system { module_request };
|
||||
allow netmgrd proc_net:file rw_file_perms;
|
||||
allow netmgrd netmgr_data_file:dir rw_dir_perms;
|
||||
allow netmgrd netmgr_data_file:file create_file_perms;
|
||||
allow netmgrd system_file:file execute_no_trans;
|
||||
# TODO(b/117232795): Figure out what is executed by netmgrd in /system and route
|
||||
# that dependency to netutils_wrapper.
|
||||
auditallow netmgrd system_file:file execute_no_trans;
|
||||
|
||||
allow netmgrd self:capability { net_admin net_raw setgid setpcap setuid };
|
||||
|
||||
|
||||
Reference in New Issue
Block a user