Roshan Pius | a483b5d | 2019-11-22 09:33:37 -0800 | [diff] [blame] | 1 | # Networking service app |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 2 | typeattribute network_stack coredomain, mlstrustedsubject; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 3 | |
| 4 | app_domain(network_stack); |
| 5 | net_domain(network_stack); |
| 6 | |
| 7 | allow network_stack self:global_capability_class_set { |
| 8 | net_admin |
| 9 | net_bind_service |
| 10 | net_broadcast |
| 11 | net_raw |
| 12 | }; |
| 13 | |
| 14 | # Allow access to net_admin ioctl, DHCP server uses SIOCSARP |
| 15 | allowxperm network_stack self:udp_socket ioctl priv_sock_ioctls; |
| 16 | |
| 17 | # The DhcpClient uses packet_sockets |
| 18 | allow network_stack self:packet_socket create_socket_perms_no_ioctl; |
| 19 | |
Remi NGUYEN VAN | 780fbad | 2019-01-28 13:08:42 +0900 | [diff] [blame] | 20 | # Monitor neighbors via netlink. |
| 21 | allow network_stack self:netlink_route_socket nlmsg_write; |
| 22 | |
Remi NGUYEN VAN | d0f65ce | 2019-01-11 07:35:17 +0900 | [diff] [blame] | 23 | allow network_stack app_api_service:service_manager find; |
Luke Huang | 524f25e | 2019-02-25 20:12:15 +0800 | [diff] [blame] | 24 | allow network_stack dnsresolver_service:service_manager find; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 25 | allow network_stack netd_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 26 | allow network_stack network_watchlist_service:service_manager find; |
Remi NGUYEN VAN | fd758cb | 2019-01-15 16:57:32 +0900 | [diff] [blame] | 27 | allow network_stack radio_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 28 | allow network_stack system_config_service:service_manager find; |
Xiao Ma | c06f0f6 | 2019-03-08 12:33:03 +0900 | [diff] [blame] | 29 | allow network_stack radio_data_file:dir create_dir_perms; |
| 30 | allow network_stack radio_data_file:file create_file_perms; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 31 | |
| 32 | binder_call(network_stack, netd); |
Roshan Pius | 1086c7d | 2019-10-01 13:49:21 -0700 | [diff] [blame] | 33 | |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 34 | # in order to invoke side effect of close() on such a socket calling synchronize_rcu() |
| 35 | # TODO: Remove this permission when 4.9 kernel is deprecated. |
| 36 | allow network_stack self:key_socket create; |
Maciej Żenczykowski | e70c300 | 2021-04-09 07:29:29 -0700 | [diff] [blame] | 37 | # Java's Os.close() in libcore/luni/src/main/java/libcore/io/BlockGuardOs.java;l=100 |
| 38 | # calls if (fd.isSocket$()) if (isLingerSocket(fd)) ... |
| 39 | dontaudit network_stack self:key_socket getopt; |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 40 | |
| 41 | # Grant read permission of connectivity namespace system property prefix. |
| 42 | get_prop(network_stack, device_config_connectivity_prop) |
| 43 | |
Chiachang Wang | e063585 | 2019-10-12 20:49:23 +0900 | [diff] [blame] | 44 | # Create/use netlink_tcpdiag_socket to get tcp info |
| 45 | allow network_stack self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write }; |
markchien | e9bb9a4 | 2019-11-21 12:58:31 +0800 | [diff] [blame] | 46 | ############### Tethering Service app - Tethering.apk ############## |
| 47 | hal_client_domain(network_stack, hal_tetheroffload) |
| 48 | # Create and share netlink_netfilter_sockets for tetheroffload. |
| 49 | allow network_stack self:netlink_netfilter_socket create_socket_perms_no_ioctl; |
markchien | c5aa484 | 2019-12-12 12:54:57 +0800 | [diff] [blame] | 50 | allow network_stack network_stack_service:service_manager find; |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 51 | # allow Tethering(network_stack process) to run/update/read the eBPF maps to offload tethering traffic by eBPF. |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 52 | allow network_stack { fs_bpf fs_bpf_tethering }:dir search; |
| 53 | allow network_stack { fs_bpf fs_bpf_tethering }:file { read write }; |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 54 | allow network_stack bpfloader:bpf { map_read map_write prog_run }; |
Maciej Żenczykowski | 5a7e49e | 2020-12-02 20:45:36 -0800 | [diff] [blame] | 55 | |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 56 | # Only the bpfloader and the network_stack should ever touch 'fs_bpf_tethering' programs/maps. |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 57 | # Unfortunately init/vendor_init have all sorts of extra privs |
Maciej Żenczykowski | c23fb98 | 2021-03-16 03:03:53 -0700 | [diff] [blame] | 58 | neverallow { domain -bpfloader -init -network_stack -vendor_init } fs_bpf_tethering:dir ~getattr; |
| 59 | neverallow { domain -bpfloader -init -network_stack -vendor_init } fs_bpf_tethering:file *; |
Xiao Ma | 2d6c9f0 | 2021-02-02 10:27:38 +0000 | [diff] [blame] | 60 | |
Maciej Żenczykowski | c23fb98 | 2021-03-16 03:03:53 -0700 | [diff] [blame] | 61 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:dir ~{ getattr open read search setattr }; |
| 62 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:file ~{ map open read setattr }; |