Alex Klyubin | f5446eb | 2017-03-23 14:27:32 -0700 | [diff] [blame] | 1 | typeattribute netd coredomain; |
Steven Moreland | 6598175 | 2022-02-10 00:32:44 +0000 | [diff] [blame] | 2 | typeattribute netd bpfdomain; |
Alex Klyubin | f5446eb | 2017-03-23 14:27:32 -0700 | [diff] [blame] | 3 | |
dcashman | cc39f63 | 2016-07-22 13:13:11 -0700 | [diff] [blame] | 4 | init_daemon_domain(netd) |
| 5 | |
| 6 | # Allow netd to spawn dnsmasq in it's own domain |
| 7 | domain_auto_trans(netd, dnsmasq_exec, dnsmasq) |
| 8 | |
Maciej Żenczykowski | 37ca69e | 2023-11-18 03:36:05 +0000 | [diff] [blame^] | 9 | allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:dir search; |
| 10 | allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:file { getattr read }; |
| 11 | allow netd { fs_bpf fs_bpf_netd_shared }:file write; |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 12 | |
Chenbo Feng | 7b57104 | 2018-12-04 17:57:27 -0800 | [diff] [blame] | 13 | # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write |
| 14 | # the map created by bpfloader |
| 15 | allow netd bpfloader:bpf { prog_run map_read map_write }; |
Joel Fernandes | b76a639 | 2019-01-11 08:32:45 -0500 | [diff] [blame] | 16 | |
Chenbo Feng | 8a5539b | 2019-02-27 17:44:26 -0800 | [diff] [blame] | 17 | # in order to invoke side effect of close() on such a socket calling synchronize_rcu() |
| 18 | # TODO: Remove this permission when 4.9 kernel is deprecated. |
Ken Chen | 1aed006 | 2022-01-28 15:04:09 +0800 | [diff] [blame] | 19 | # TODO: Remove this after we remove all bpf interactions from netd. |
Chenbo Feng | 8a5539b | 2019-02-27 17:44:26 -0800 | [diff] [blame] | 20 | allow netd self:key_socket create; |
| 21 | |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 22 | set_prop(netd, ctl_mdnsd_prop) |
| 23 | set_prop(netd, netd_stable_secret_prop) |
| 24 | |
steven_fann | d3e8f6f | 2021-01-26 13:34:00 +0800 | [diff] [blame] | 25 | get_prop(netd, adbd_config_prop) |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 26 | get_prop(netd, hwservicemanager_prop) |
| 27 | get_prop(netd, device_config_netd_native_prop) |
lifr | 980c08c | 2018-11-21 22:53:48 +0800 | [diff] [blame] | 28 | |
| 29 | # Allow netd to write to statsd. |
| 30 | unix_socket_send(netd, statsdw, statsd) |
Remi NGUYEN VAN | 780fbad | 2019-01-28 13:08:42 +0900 | [diff] [blame] | 31 | |
| 32 | # Allow netd to send callbacks to network_stack |
| 33 | binder_call(netd, network_stack) |
| 34 | |
Chalard Jean | a4c9f7b | 2019-04-05 17:33:56 +0900 | [diff] [blame] | 35 | # Allow netd to send dump info to dumpstate |
| 36 | allow netd dumpstate:fd use; |
| 37 | allow netd dumpstate:fifo_file { getattr write }; |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 38 | |
| 39 | # persist.netd.stable_secret contains RFC 7217 secret key which should never be |
| 40 | # leaked to other processes. Make sure it never leaks. |
| 41 | neverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms; |
| 42 | |
| 43 | # We want to ensure that no other process ever tries tampering with persist.netd.stable_secret, |
| 44 | # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy. |
| 45 | neverallow { domain -netd -init } netd_stable_secret_prop:property_service set; |