xref: /aosp_15_r20/system/sepolicy/private/hal_wifi_supplicant.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1*e4a36f41SAndroid Build Coastguard Worker# HwBinder IPC from client to server
2*e4a36f41SAndroid Build Coastguard Workerbinder_call(hal_wifi_supplicant_client, hal_wifi_supplicant_server)
3*e4a36f41SAndroid Build Coastguard Workerbinder_call(hal_wifi_supplicant_server, hal_wifi_supplicant_client)
4*e4a36f41SAndroid Build Coastguard Worker
5*e4a36f41SAndroid Build Coastguard Workerhal_attribute_hwservice(hal_wifi_supplicant, hal_wifi_supplicant_hwservice)
6*e4a36f41SAndroid Build Coastguard Workerhal_attribute_service(hal_wifi_supplicant, hal_wifi_supplicant_service)
7*e4a36f41SAndroid Build Coastguard Worker
8*e4a36f41SAndroid Build Coastguard Worker# in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
9*e4a36f41SAndroid Build Coastguard Workerallowxperm hal_wifi_supplicant self:udp_socket ioctl priv_sock_ioctls;
10*e4a36f41SAndroid Build Coastguard Worker
11*e4a36f41SAndroid Build Coastguard Workerr_dir_file(hal_wifi_supplicant, sysfs_type)
12*e4a36f41SAndroid Build Coastguard Workerr_dir_file(hal_wifi_supplicant, proc_net_type)
13*e4a36f41SAndroid Build Coastguard Worker
14*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant self:global_capability_class_set { setuid net_admin setgid net_raw };
15*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant cgroup:dir create_dir_perms;
16*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant cgroup_v2:dir create_dir_perms;
17*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant self:netlink_route_socket nlmsg_write;
18*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant self:netlink_socket create_socket_perms_no_ioctl;
19*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant self:netlink_generic_socket create_socket_perms_no_ioctl;
20*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant self:packet_socket create_socket_perms;
21*e4a36f41SAndroid Build Coastguard Workerallowxperm hal_wifi_supplicant self:packet_socket ioctl { unpriv_sock_ioctls priv_sock_ioctls unpriv_tty_ioctls };
22*e4a36f41SAndroid Build Coastguard Worker
23*e4a36f41SAndroid Build Coastguard Workeruse_keystore(hal_wifi_supplicant)
24*e4a36f41SAndroid Build Coastguard Workerbinder_use(hal_wifi_supplicant_server)
25*e4a36f41SAndroid Build Coastguard Worker
26*e4a36f41SAndroid Build Coastguard Worker# Allow the WI-FI HAL to use keys in the keystore namespace wifi_key.
27*e4a36f41SAndroid Build Coastguard Workerallow hal_wifi_supplicant wifi_key:keystore2_key {
28*e4a36f41SAndroid Build Coastguard Worker    get_info
29*e4a36f41SAndroid Build Coastguard Worker    use
30*e4a36f41SAndroid Build Coastguard Worker};
31*e4a36f41SAndroid Build Coastguard Worker
32*e4a36f41SAndroid Build Coastguard Worker###
33*e4a36f41SAndroid Build Coastguard Worker### neverallow rules
34*e4a36f41SAndroid Build Coastguard Worker###
35*e4a36f41SAndroid Build Coastguard Worker
36*e4a36f41SAndroid Build Coastguard Worker# wpa_supplicant should not trust any data from sdcards
37*e4a36f41SAndroid Build Coastguard Workerneverallow hal_wifi_supplicant_server { sdcard_type fuse }:dir ~getattr;
38*e4a36f41SAndroid Build Coastguard Workerneverallow hal_wifi_supplicant_server { sdcard_type fuse }:file *;
39