Roshan Pius | a483b5d | 2019-11-22 09:33:37 -0800 | [diff] [blame] | 1 | # Networking service app |
Steven Moreland | 6598175 | 2022-02-10 00:32:44 +0000 | [diff] [blame] | 2 | typeattribute network_stack coredomain; |
| 3 | typeattribute network_stack mlstrustedsubject; |
| 4 | typeattribute network_stack bpfdomain; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 5 | |
| 6 | app_domain(network_stack); |
| 7 | net_domain(network_stack); |
| 8 | |
| 9 | allow network_stack self:global_capability_class_set { |
| 10 | net_admin |
| 11 | net_bind_service |
| 12 | net_broadcast |
| 13 | net_raw |
| 14 | }; |
| 15 | |
Maciej Żenczykowski | fd0efeb | 2023-12-08 09:30:54 +0000 | [diff] [blame] | 16 | allow network_stack self:global_capability2_class_set wake_alarm; |
| 17 | |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 18 | # Allow access to net_admin ioctl, DHCP server uses SIOCSARP |
| 19 | allowxperm network_stack self:udp_socket ioctl priv_sock_ioctls; |
| 20 | |
| 21 | # The DhcpClient uses packet_sockets |
| 22 | allow network_stack self:packet_socket create_socket_perms_no_ioctl; |
| 23 | |
Remi NGUYEN VAN | 780fbad | 2019-01-28 13:08:42 +0900 | [diff] [blame] | 24 | # Monitor neighbors via netlink. |
| 25 | allow network_stack self:netlink_route_socket nlmsg_write; |
| 26 | |
Patrick Rohr | ab02397 | 2022-05-19 21:34:31 -0700 | [diff] [blame] | 27 | # Use netlink uevent sockets. |
| 28 | allow network_stack self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; |
| 29 | |
| 30 | # give network_stack the same netlink permissions as netd |
| 31 | allow network_stack self:netlink_nflog_socket create_socket_perms_no_ioctl; |
| 32 | allow network_stack self:netlink_socket create_socket_perms_no_ioctl; |
| 33 | allow network_stack self:netlink_generic_socket create_socket_perms_no_ioctl; |
| 34 | |
Remi NGUYEN VAN | d0f65ce | 2019-01-11 07:35:17 +0900 | [diff] [blame] | 35 | allow network_stack app_api_service:service_manager find; |
Luke Huang | 524f25e | 2019-02-25 20:12:15 +0800 | [diff] [blame] | 36 | allow network_stack dnsresolver_service:service_manager find; |
paulhu | 70b0a77 | 2021-12-09 11:49:23 +0800 | [diff] [blame] | 37 | allow network_stack mdns_service:service_manager find; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 38 | allow network_stack netd_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 39 | allow network_stack network_watchlist_service:service_manager find; |
Remi NGUYEN VAN | fd758cb | 2019-01-15 16:57:32 +0900 | [diff] [blame] | 40 | allow network_stack radio_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 41 | allow network_stack system_config_service:service_manager find; |
Xiao Ma | c06f0f6 | 2019-03-08 12:33:03 +0900 | [diff] [blame] | 42 | allow network_stack radio_data_file:dir create_dir_perms; |
| 43 | allow network_stack radio_data_file:file create_file_perms; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 44 | |
| 45 | binder_call(network_stack, netd); |
Roshan Pius | 1086c7d | 2019-10-01 13:49:21 -0700 | [diff] [blame] | 46 | |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 47 | # in order to invoke side effect of close() on such a socket calling synchronize_rcu() |
Maciej Żenczykowski | 28960d3 | 2023-06-13 20:44:48 -0700 | [diff] [blame] | 48 | # TODO: Still needed as of kernel 6.6-rc1 - see BpfUtils.h synchronizeKernelRCU() |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 49 | allow network_stack self:key_socket create; |
Maciej Żenczykowski | e70c300 | 2021-04-09 07:29:29 -0700 | [diff] [blame] | 50 | # Java's Os.close() in libcore/luni/src/main/java/libcore/io/BlockGuardOs.java;l=100 |
| 51 | # calls if (fd.isSocket$()) if (isLingerSocket(fd)) ... |
| 52 | dontaudit network_stack self:key_socket getopt; |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 53 | |
| 54 | # Grant read permission of connectivity namespace system property prefix. |
| 55 | get_prop(network_stack, device_config_connectivity_prop) |
| 56 | |
Chiachang Wang | e063585 | 2019-10-12 20:49:23 +0900 | [diff] [blame] | 57 | # Create/use netlink_tcpdiag_socket to get tcp info |
Bo Hu | aa57726 | 2024-12-01 21:14:32 +0000 | [diff] [blame] | 58 | allow network_stack self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write }; |
markchien | e9bb9a4 | 2019-11-21 12:58:31 +0800 | [diff] [blame] | 59 | ############### Tethering Service app - Tethering.apk ############## |
| 60 | hal_client_domain(network_stack, hal_tetheroffload) |
| 61 | # Create and share netlink_netfilter_sockets for tetheroffload. |
| 62 | allow network_stack self:netlink_netfilter_socket create_socket_perms_no_ioctl; |
markchien | c5aa484 | 2019-12-12 12:54:57 +0800 | [diff] [blame] | 63 | allow network_stack network_stack_service:service_manager find; |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 64 | # allow Tethering(network_stack process) to run/update/read the eBPF maps to offload tethering traffic by eBPF. |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 65 | allow network_stack { fs_bpf_net_private fs_bpf_net_shared fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_tethering }:dir search; |
Maciej Żenczykowski | 52c8a2e | 2023-03-27 18:14:40 -0700 | [diff] [blame] | 66 | allow network_stack { fs_bpf_net_private fs_bpf_net_shared fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_tethering }:file { getattr read write }; |
Maciej Żenczykowski | 28960d3 | 2023-06-13 20:44:48 -0700 | [diff] [blame] | 67 | allow network_stack bpfloader:bpf prog_run; |
| 68 | allow network_stack self:bpf map_create; |
| 69 | allow network_stack { bpfloader netd network_stack system_server }:bpf { map_read map_write }; |
| 70 | |
Motomu Utsumi | 2473262 | 2023-05-11 19:36:18 +0900 | [diff] [blame] | 71 | # allow Tethering(network_stack process) to read flag value in tethering_u_or_later_native namespace |
| 72 | get_prop(network_stack, device_config_tethering_u_or_later_native_prop) |
Maciej Żenczykowski | 5a7e49e | 2020-12-02 20:45:36 -0800 | [diff] [blame] | 73 | |
Benedict Wong | b25b4bf | 2022-05-20 20:55:32 +0000 | [diff] [blame] | 74 | # Use XFRM (IPsec) netlink sockets |
Bo Hu | b55aaff | 2024-12-01 21:14:32 +0000 | [diff] [blame] | 75 | allow network_stack self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read }; |
Benedict Wong | b25b4bf | 2022-05-20 20:55:32 +0000 | [diff] [blame] | 76 | |
Patrick Rohr | 02b5535 | 2022-05-31 20:29:55 -0700 | [diff] [blame] | 77 | # tun device used for 3rd party vpn apps and test network manager |
| 78 | allow network_stack tun_device:chr_file rw_file_perms; |
| 79 | allowxperm network_stack tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF TUNSETLINK TUNSETCARRIER }; |
| 80 | |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 81 | ############### NEVER ALLOW RULES |
| 82 | # This place is as good as any for these rules, |
| 83 | # and it is probably the most appropriate because |
| 84 | # network_stack itself is entirely mainline code. |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 85 | |
| 86 | # T+: Only the bpfloader and the network_stack should ever touch 'fs_bpf_net_private' programs/maps. |
Maciej Żenczykowski | ebb45f9 | 2022-12-01 14:45:35 +0000 | [diff] [blame] | 87 | neverallow { domain -bpfloader -network_stack } fs_bpf_net_private:dir ~getattr; |
| 88 | neverallow { domain -bpfloader -network_stack } fs_bpf_net_private:file *; |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 89 | |
| 90 | # T+: Only the bpfloader, network_stack and system_server should ever touch 'fs_bpf_net_shared' programs/maps. |
Maciej Żenczykowski | ebb45f9 | 2022-12-01 14:45:35 +0000 | [diff] [blame] | 91 | neverallow { domain -bpfloader -network_stack -system_server } fs_bpf_net_shared:dir ~getattr; |
| 92 | neverallow { domain -bpfloader -network_stack -system_server } fs_bpf_net_shared:file *; |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 93 | |
| 94 | # T+: Only the bpfloader, netd, network_stack and system_server should ever touch 'fs_bpf_netd_readonly' programs/maps. |
| 95 | # netd's access should be readonly |
Maciej Żenczykowski | ebb45f9 | 2022-12-01 14:45:35 +0000 | [diff] [blame] | 96 | neverallow { domain -bpfloader -netd -network_stack -system_server } fs_bpf_netd_readonly:dir ~getattr; |
| 97 | neverallow { domain -bpfloader -netd -network_stack -system_server } fs_bpf_netd_readonly:file *; |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 98 | neverallow netd fs_bpf_netd_readonly:file write; |
| 99 | |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 100 | # T+: Only the bpfloader, netd, netutils_wrapper, network_stack and system_server should ever touch 'fs_bpf_netd_shared' programs/maps. |
| 101 | # netutils_wrapper requires access to be able to run iptables and only needs readonly access |
Maciej Żenczykowski | ebb45f9 | 2022-12-01 14:45:35 +0000 | [diff] [blame] | 102 | neverallow { domain -bpfloader -netd -netutils_wrapper -network_stack -system_server } fs_bpf_netd_shared:dir ~getattr; |
| 103 | neverallow { domain -bpfloader -netd -netutils_wrapper -network_stack -system_server } fs_bpf_netd_shared:file *; |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 104 | neverallow netutils_wrapper fs_bpf_netd_shared:file write; |
| 105 | |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 106 | # S+: Only the bpfloader and the network_stack should ever touch 'fs_bpf_tethering' programs/maps. |
Maciej Żenczykowski | ebb45f9 | 2022-12-01 14:45:35 +0000 | [diff] [blame] | 107 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:dir ~getattr; |
| 108 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:file *; |