f26d813033
- allow all apps to connect to the keystore over unix socket - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files - mtp connects to dnsproxyd when a pptp vpn connection is established - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device - WifiWatchDog uses packet_socket when wifi comes up - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949 Signed-off-by: Joshua Brindle <jbrindle@tresys.com>
25 lines
992 B
Plaintext
25 lines
992 B
Plaintext
type dhcp, domain;
|
|
type dhcp_exec, exec_type, file_type;
|
|
type dhcp_data_file, file_type, data_file_type;
|
|
type dhcp_system_file, file_type, data_file_type;
|
|
|
|
init_daemon_domain(dhcp)
|
|
|
|
allow dhcp cgroup:dir { create add_name };
|
|
allow dhcp self:capability { setgid setuid net_admin net_raw };
|
|
allow dhcp self:packet_socket { create setopt bind write read };
|
|
allow dhcp self:netlink_route_socket { write nlmsg_write read create bind };
|
|
allow dhcp self:udp_socket { create ioctl };
|
|
allow dhcp shell_exec:file { read open execute };
|
|
allow dhcp system_file:file execute_no_trans;
|
|
allow dhcp proc:file write;
|
|
allow dhcp property_socket:sock_file write ;
|
|
allow dhcp system_prop:property_service set ;
|
|
allow dhcp dhcp_system_file:file rx_file_perms;
|
|
allow dhcp dhcp_system_file:dir r_dir_perms;
|
|
unix_socket_connect(dhcp, property, init)
|
|
|
|
type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
|
allow dhcp dhcp_data_file:dir create_dir_perms;
|
|
allow dhcp dhcp_data_file:file create_file_perms;
|