Skip to content
Snippets Groups Projects
Commit 1780a627 authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

domain_deprecated.te: remove /proc/net access

am: dd649da8

Change-Id: I648e8b2869b4b2d95255575e257f07f11153865d
parents 7aa5caf8 dd649da8
No related branches found
No related tags found
No related merge requests found
...@@ -80,7 +80,6 @@ r_dir_file(domain_deprecated, proc) ...@@ -80,7 +80,6 @@ r_dir_file(domain_deprecated, proc)
r_dir_file(domain_deprecated, sysfs) r_dir_file(domain_deprecated, sysfs)
r_dir_file(domain_deprecated, cgroup) r_dir_file(domain_deprecated, cgroup)
allow domain_deprecated proc_meminfo:file r_file_perms; allow domain_deprecated proc_meminfo:file r_file_perms;
r_dir_file(domain_deprecated, proc_net)
#auditallow domain_deprecated proc:dir r_dir_perms; # r_dir_perms granted in domain #auditallow domain_deprecated proc:dir r_dir_perms; # r_dir_perms granted in domain
auditallow { domain_deprecated -fsck -fsck_untrusted -init -priv_app -rild -system_server -vold } proc:file r_file_perms; auditallow { domain_deprecated -fsck -fsck_untrusted -init -priv_app -rild -system_server -vold } proc:file r_file_perms;
auditallow { domain_deprecated -fsck -fsck_untrusted -init -priv_app -rild -system_server -vold } proc:lnk_file { open ioctl lock }; # getattr read granted in domain auditallow { domain_deprecated -fsck -fsck_untrusted -init -priv_app -rild -system_server -vold } proc:lnk_file { open ioctl lock }; # getattr read granted in domain
...@@ -120,19 +119,6 @@ auditallow { ...@@ -120,19 +119,6 @@ auditallow {
-zygote -zygote
} cgroup:{ file lnk_file } r_file_perms; } cgroup:{ file lnk_file } r_file_perms;
auditallow { domain_deprecated -appdomain -init -priv_app -surfaceflinger -system_server -vold } proc_meminfo:file r_file_perms; auditallow { domain_deprecated -appdomain -init -priv_app -surfaceflinger -system_server -vold } proc_meminfo:file r_file_perms;
auditallow { domain_deprecated -appdomain -clatd -init -netd -system_server -vold -wpa -zygote } proc_net:dir { open getattr read ioctl lock }; # search granted in domain
auditallow {
domain_deprecated
-appdomain
-clatd
-dumpstate
-init
-netd
-system_server
-vold
-wpa
-zygote
} proc_net:{ file lnk_file } r_file_perms;
# Get SELinux enforcing status. # Get SELinux enforcing status.
allow domain_deprecated selinuxfs:dir r_dir_perms; allow domain_deprecated selinuxfs:dir r_dir_perms;
......
...@@ -29,6 +29,7 @@ allow netd shell_exec:file rx_file_perms; ...@@ -29,6 +29,7 @@ allow netd shell_exec:file rx_file_perms;
allow netd system_file:file x_file_perms; allow netd system_file:file x_file_perms;
allow netd devpts:chr_file rw_file_perms; allow netd devpts:chr_file rw_file_perms;
r_dir_file(netd, proc_net)
# For /proc/sys/net/ipv[46]/route/flush. # For /proc/sys/net/ipv[46]/route/flush.
allow netd proc_net:file rw_file_perms; allow netd proc_net:file rw_file_perms;
......
...@@ -5,6 +5,8 @@ type ppp_exec, exec_type, file_type; ...@@ -5,6 +5,8 @@ type ppp_exec, exec_type, file_type;
net_domain(ppp) net_domain(ppp)
r_dir_file(ppp, proc_net)
allow ppp mtp:socket rw_socket_perms_no_ioctl; allow ppp mtp:socket rw_socket_perms_no_ioctl;
allow ppp mtp:unix_dgram_socket rw_socket_perms; allow ppp mtp:unix_dgram_socket rw_socket_perms;
allow ppp ppp_device:chr_file rw_file_perms; allow ppp ppp_device:chr_file rw_file_perms;
......
...@@ -44,6 +44,7 @@ allow rild self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; ...@@ -44,6 +44,7 @@ allow rild self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
wakelock_use(rild) wakelock_use(rild)
r_dir_file(rild, proc) r_dir_file(rild, proc)
r_dir_file(rild, proc_net)
r_dir_file(rild, sysfs_type) r_dir_file(rild, sysfs_type)
r_dir_file(rild, system_file) r_dir_file(rild, system_file)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment