# network manager type netd, domain, domain_deprecated, mlstrustedsubject; type netd_exec, exec_type, file_type; init_daemon_domain(netd) net_domain(netd) allow netd self:capability { net_admin net_raw kill }; # Note: fsetid is deliberately not included above. fsetid checks are # triggered by chmod on a directory or file owned by a group other # than one of the groups assigned to the current process to see if # the setgid bit should be cleared, regardless of whether the setgid # bit was even set. We do not appear to truly need this capability # for netd to operate. dontaudit netd self:capability fsetid; allow netd self:netlink_kobject_uevent_socket create_socket_perms; allow netd self:netlink_route_socket nlmsg_write; allow netd self:netlink_nflog_socket create_socket_perms; allow netd self:netlink_socket create_socket_perms; allow netd self:netlink_tcpdiag_socket { create_socket_perms nlmsg_read nlmsg_write }; allow netd self:netlink_generic_socket create_socket_perms; allow netd self:netlink_netfilter_socket create_socket_perms; allow netd shell_exec:file rx_file_perms; allow netd system_file:file x_file_perms; allow netd devpts:chr_file rw_file_perms; # For /proc/sys/net/ipv[46]/route/flush. allow netd proc_net:file write; # For /sys/modules/bcmdhd/parameters/firmware_path # XXX Split into its own type. allow netd sysfs:file write; # TODO: added to match above sysfs rule. Remove me? allow netd sysfs_usb:file write; # Needed to update /data/misc/wifi/hostapd.conf # TODO: See what we can do to reduce the need for # these capabilities allow netd self:capability { dac_override chown fowner }; allow netd wifi_data_file:file create_file_perms; allow netd wifi_data_file:dir rw_dir_perms; # Needed to update /data/misc/net/rt_tables allow netd net_data_file:file create_file_perms; allow netd net_data_file:dir rw_dir_perms; # Allow netd to spawn hostapd in it's own domain domain_auto_trans(netd, hostapd_exec, hostapd) allow netd hostapd:process signal; # Allow netd to spawn dnsmasq in it's own domain domain_auto_trans(netd, dnsmasq_exec, dnsmasq) allow netd dnsmasq:process signal; # Allow netd to start clatd in its own domain domain_auto_trans(netd, clatd_exec, clatd) allow netd clatd:process signal; set_prop(netd, ctl_mdnsd_prop) # Allow netd to publish a binder service and make binder calls. binder_use(netd) allow netd netd_service:service_manager add; allow netd dumpstate:fifo_file { getattr write }; # Allow netd to call into the system server so it can check permissions. allow netd system_server:binder call; allow netd permission_service:service_manager find; # Allow netd to talk to the framework service which collects DNS query metrics. allow netd dns_listener_service:service_manager find; # Allow netd to operate on sockets that are passed to it. allow netd netdomain:{tcp_socket udp_socket rawip_socket dccp_socket tun_socket} {read write getattr setattr getopt setopt}; allow netd netdomain:fd use; ### ### Neverallow rules ### ### netd should NEVER do any of this # Block device access. neverallow netd dev_type:blk_file { read write }; # ptrace any other app neverallow netd { domain }:process ptrace; # Write to /system. neverallow netd system_file:dir_file_class_set write; # Write to files in /data/data or system files on /data neverallow netd { app_data_file system_data_file }:dir_file_class_set write; # only system_server and dumpstate may interact with netd over binder neverallow { domain -system_server -dumpstate } netd_service:service_manager find; neverallow { domain -system_server -dumpstate } netd:binder call; neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call;