38 lines
1.3 KiB
Plaintext
38 lines
1.3 KiB
Plaintext
# Started by init
|
|
init_daemon_domain(netmgrd)
|
|
|
|
# Starts as (root,radio) changes to (radio,radio)
|
|
allow netmgrd self:capability { setuid setgid net_admin net_raw };
|
|
|
|
# Support modprobe??
|
|
dontaudit netmgrd self:capability sys_module;
|
|
|
|
allowxperm netmgrd self:udp_socket ioctl priv_sock_ioctls;
|
|
allow netmgrd self:udp_socket { create ioctl };
|
|
allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
|
|
allow netmgrd self:netlink_route_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write };
|
|
allow netmgrd self:packet_socket create_socket_perms_no_ioctl;
|
|
allow netmgrd self:rawip_socket create_socket_perms_no_ioctl;
|
|
|
|
# Talk to qmuxd (qmux_radio)
|
|
qmux_socket(netmgrd)
|
|
|
|
# Runs commands via sh.
|
|
# TODO: Convert to direct exec of /system/bin/ip and any other helpers.
|
|
allow netmgrd shell_exec:file rx_file_perms;
|
|
|
|
# Runs /system/bin/ip addr flush dev <device> commands.
|
|
allow netmgrd system_file:file rx_file_perms;
|
|
|
|
# XXX Run toolbox. Might not be needed.
|
|
allow netmgrd toolbox_exec:file rx_file_perms;
|
|
auditallow netmgrd toolbox_exec:file rx_file_perms;
|
|
|
|
allow netmgrd proc_net:file r_file_perms;
|
|
allow netmgrd proc_net:dir r_dir_perms;
|
|
|
|
# set net.rmnet* properties.
|
|
set_prop(netmgrd, radio_prop)
|
|
auditallow netmgrd radio_prop:property_service set;
|
|
set_prop(netmgrd, net_radio_prop)
|