Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 1 | # bpf program loader |
| 2 | type bpfloader, domain; |
Nick Kralevich | 5e37271 | 2018-09-27 10:21:37 -0700 | [diff] [blame] | 3 | type bpfloader_exec, system_file_type, exec_type, file_type; |
Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 4 | typeattribute bpfloader coredomain; |
| 5 | |
Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 6 | # These permission is required for pin bpf program for netd. |
| 7 | allow bpfloader fs_bpf:dir create_dir_perms; |
| 8 | allow bpfloader fs_bpf:file create_file_perms; |
| 9 | allow bpfloader devpts:chr_file { read write }; |
| 10 | |
Chenbo Feng | 6cd70c2 | 2018-03-05 20:43:45 -0800 | [diff] [blame] | 11 | allow bpfloader netd:fd use; |
Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 12 | |
Chenbo Feng | 7b57104 | 2018-12-04 17:57:27 -0800 | [diff] [blame] | 13 | # Allow bpfloader to create bpf maps and programs. The map_read and map_write permission is needed |
| 14 | # for retrieving a pinned map when bpfloader do a run time restart. |
| 15 | allow bpfloader self:bpf { prog_load prog_run map_read map_write map_create }; |
Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 16 | |
Joel Fernandes | 4bf4788 | 2018-11-28 11:06:49 -0800 | [diff] [blame^] | 17 | allow bpfloader self:global_capability_class_set sys_admin; |
Nick Kralevich | 095fbea | 2018-09-13 11:07:14 -0700 | [diff] [blame] | 18 | |
| 19 | ### |
| 20 | ### Neverallow rules |
| 21 | ### |
Chenbo Feng | 68ef8c0 | 2018-03-20 15:42:44 -0700 | [diff] [blame] | 22 | neverallow { domain -bpfloader } *:bpf prog_load; |
Chenbo Feng | be9b15c | 2018-03-28 16:51:26 -0700 | [diff] [blame] | 23 | neverallow { domain -bpfloader -netd -netutils_wrapper} *:bpf prog_run; |
Chenbo Feng | 566411e | 2018-01-02 15:31:18 -0800 | [diff] [blame] | 24 | neverallow { domain -netd -bpfloader } bpfloader_exec:file { execute execute_no_trans }; |
| 25 | neverallow bpfloader domain:{ tcp_socket udp_socket rawip_socket } *; |
| 26 | # only system_server, netd and bpfloader can read/write the bpf maps |
Chenbo Feng | 7b57104 | 2018-12-04 17:57:27 -0800 | [diff] [blame] | 27 | neverallow { domain -system_server -netd -bpfloader} *:bpf { map_read map_write }; |
Joel Galenson | d65f26f | 2018-05-23 08:36:40 -0700 | [diff] [blame] | 28 | |
Nick Kralevich | 095fbea | 2018-09-13 11:07:14 -0700 | [diff] [blame] | 29 | # No domain should be allowed to ptrace bpfloader |
| 30 | neverallow { domain userdebug_or_eng(`-llkd') } bpfloader:process ptrace; |