Skip to content
Snippets Groups Projects
  • Jeff Vander Stoep's avatar
    76aab82c
    Move domain_deprecated into private policy · 76aab82c
    Jeff Vander Stoep authored
    This attribute is being actively removed from policy. Since
    attributes are not being versioned, partners must not be able to
    access and use this attribute. Move it from private and verify in
    the logs that rild and tee are not using these permissions.
    
    Bug: 38316109
    Test: build and boot Marlin
    Test: Verify that rild and tee are not being granted any of these
          permissions.
    Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
    76aab82c
    History
    Move domain_deprecated into private policy
    Jeff Vander Stoep authored
    This attribute is being actively removed from policy. Since
    attributes are not being versioned, partners must not be able to
    access and use this attribute. Move it from private and verify in
    the logs that rild and tee are not using these permissions.
    
    Bug: 38316109
    Test: build and boot Marlin
    Test: Verify that rild and tee are not being granted any of these
          permissions.
    Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
dhcp.te 1.07 KiB
type dhcp, domain;
type dhcp_exec, exec_type, file_type;

net_domain(dhcp)

allow dhcp cgroup:dir { create write add_name };
allow dhcp self:capability { setgid setuid net_admin net_raw net_bind_service };
allow dhcp self:packet_socket create_socket_perms_no_ioctl;
allow dhcp self:netlink_route_socket nlmsg_write;
allow dhcp shell_exec:file rx_file_perms;
allow dhcp system_file:file rx_file_perms;
not_full_treble(`allow dhcp vendor_file:file rx_file_perms;')

# dhcpcd runs dhcpcd-hooks/*, which runs getprop / setprop (toolbox_exec)
allow dhcp toolbox_exec:file rx_file_perms;

# For /proc/sys/net/ipv4/conf/*/promote_secondaries
allow dhcp proc_net:file write;

set_prop(dhcp, dhcp_prop)
set_prop(dhcp, pan_result_prop)

allow dhcp dhcp_data_file:dir create_dir_perms;
allow dhcp dhcp_data_file:file create_file_perms;

# PAN connections
allow dhcp netd:fd use;
allow dhcp netd:fifo_file rw_file_perms;
allow dhcp netd:{ dgram_socket_class_set unix_stream_socket } { read write };
allow dhcp netd:{ netlink_kobject_uevent_socket netlink_route_socket netlink_nflog_socket } { read write };