• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1type netmgrd, domain;
2type netmgrd_exec, exec_type, vendor_file_type, file_type;
3
4net_domain(netmgrd)
5init_daemon_domain(netmgrd)
6
7set_prop(netmgrd, vendor_net_radio_prop)
8
9allow netmgrd netmgrd_socket:dir w_dir_perms;
10allow netmgrd netmgrd_socket:sock_file create_file_perms;
11allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write };
12allow netmgrd self:netlink_generic_socket create_socket_perms_no_ioctl;
13allow netmgrd self:netlink_route_socket nlmsg_write;
14allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
15allow netmgrd self:socket create_socket_perms;
16allowxperm netmgrd self:socket ioctl msm_sock_ipc_ioctls;
17allowxperm netmgrd self:udp_socket ioctl priv_sock_ioctls;
18
19allow netmgrd sysfs_net:dir r_dir_perms;
20allow netmgrd sysfs_net:file rw_file_perms;
21allow netmgrd sysfs_soc:dir search;
22allow netmgrd sysfs_soc:file r_file_perms;
23allow netmgrd sysfs_msm_subsys:dir r_dir_perms;
24allow netmgrd sysfs_msm_subsys:file r_file_perms;
25
26userdebug_or_eng(`
27  allow netmgrd diag_device:chr_file rw_file_perms;
28')
29
30r_dir_file(netmgrd, sysfs_msm_subsys)
31
32wakelock_use(netmgrd)
33
34#Allow netutils usage
35domain_auto_trans(netmgrd, netutils_wrapper_exec, netutils_wrapper)
36allow netmgrd netutils_wrapper:process sigkill;
37
38#Allow diag logging
39allow netmgrd sysfs_timestamp_switch:file { read open };
40userdebug_or_eng(`
41  r_dir_file(netmgrd, sysfs_diag)
42')
43
44#Ignore if device loading for private IOCTL failed
45dontaudit netmgrd kernel:system { module_request };
46
47allow netmgrd proc_net:file rw_file_perms;
48allow netmgrd netmgr_data_file:dir rw_dir_perms;
49allow netmgrd netmgr_data_file:file create_file_perms;
50allow netmgrd netmgr_recovery_data_file:file create_file_perms;
51allow netmgrd netmgr_recovery_data_file:dir rw_dir_perms;
52
53allow netmgrd self:capability { net_admin net_raw setgid setpcap setuid };
54
55allow netmgrd vendor_toolbox_exec:file rx_file_perms;
56
57# Allow netmgrd to use netd HAL
58allow netmgrd system_net_netd_hwservice:hwservice_manager find;
59get_prop(netmgrd, hwservicemanager_prop)
60binder_call(netmgrd, netd)
61hwbinder_use(netmgrd)
62
63dontaudit netmgrd kernel:system module_request;
64dontaudit netmgrd self:system module_request;
65dontaudit netmgrd self:capability sys_module;
66