blob: 93d01414375b7509852f31ea6f3b97fa69125a01 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute netd coredomain;
Steven Moreland65981752022-02-10 00:32:44 +00002typeattribute netd bpfdomain;
Alex Klyubinf5446eb2017-03-23 14:27:32 -07003
dcashmancc39f632016-07-22 13:13:11 -07004init_daemon_domain(netd)
5
6# Allow netd to spawn dnsmasq in it's own domain
7domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8
Maciej Żenczykowski37ca69e2023-11-18 03:36:05 +00009allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:dir search;
10allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:file { getattr read };
11allow netd { fs_bpf fs_bpf_netd_shared }:file write;
Maciej Żenczykowskib13921c2022-05-21 05:03:29 -070012
Maciej Żenczykowski28960d32023-06-13 20:44:48 -070013# give netd permission to setup iptables rule with xt_bpf, attach program to cgroup,
14# create maps, and read/write maps created by bpfloader, itself and NS/SS mainline networking
15allow netd bpfloader:bpf prog_run;
16allow netd self:bpf map_create;
17allow netd { bpfloader netd network_stack system_server }:bpf { map_read map_write };
Joel Fernandesb76a6392019-01-11 08:32:45 -050018
Chenbo Feng8a5539b2019-02-27 17:44:26 -080019# in order to invoke side effect of close() on such a socket calling synchronize_rcu()
Maciej Żenczykowski28960d32023-06-13 20:44:48 -070020# TODO: Still needed as of kernel 6.6-rc1 - see BpfUtils.h synchronizeKernelRCU()
Ken Chen1aed0062022-01-28 15:04:09 +080021# TODO: Remove this after we remove all bpf interactions from netd.
Chenbo Feng8a5539b2019-02-27 17:44:26 -080022allow netd self:key_socket create;
23
Inseob Kim55e5c9b2020-03-04 17:20:35 +090024set_prop(netd, ctl_mdnsd_prop)
25set_prop(netd, netd_stable_secret_prop)
26
steven_fannd3e8f6f2021-01-26 13:34:00 +080027get_prop(netd, adbd_config_prop)
Inseob Kim55e5c9b2020-03-04 17:20:35 +090028get_prop(netd, hwservicemanager_prop)
29get_prop(netd, device_config_netd_native_prop)
lifr980c08c2018-11-21 22:53:48 +080030
31# Allow netd to write to statsd.
32unix_socket_send(netd, statsdw, statsd)
Remi NGUYEN VAN780fbad2019-01-28 13:08:42 +090033
34# Allow netd to send callbacks to network_stack
35binder_call(netd, network_stack)
36
Chalard Jeana4c9f7b2019-04-05 17:33:56 +090037# Allow netd to send dump info to dumpstate
38allow netd dumpstate:fd use;
39allow netd dumpstate:fifo_file { getattr write };
Inseob Kim55e5c9b2020-03-04 17:20:35 +090040
Inseob Kim75806ef2024-03-27 17:18:41 +090041net_domain(netd)
42# Connect to mdnsd via mdnsd socket.
43unix_socket_connect(netd, mdnsd, mdnsd)
44# in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
45allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
46
47r_dir_file(netd, cgroup)
48
49allow netd system_server:fd use;
50
51allow netd self:global_capability_class_set { net_admin net_raw kill };
52# Note: fsetid is deliberately not included above. fsetid checks are
53# triggered by chmod on a directory or file owned by a group other
54# than one of the groups assigned to the current process to see if
55# the setgid bit should be cleared, regardless of whether the setgid
56# bit was even set. We do not appear to truly need this capability
57# for netd to operate.
58dontaudit netd self:global_capability_class_set fsetid;
59
60# Allow netd to open /dev/tun, set it up and pass it to clatd
61allow netd tun_device:chr_file rw_file_perms;
62allowxperm netd tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF };
63allow netd self:tun_socket create;
64
65allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
66allow netd self:netlink_route_socket nlmsg_write;
67allow netd self:netlink_nflog_socket create_socket_perms_no_ioctl;
68allow netd self:netlink_socket create_socket_perms_no_ioctl;
Thiébaud Weksteen67c1b352024-10-18 14:27:13 +110069allow netd self:netlink_tcpdiag_socket create_socket_perms_no_ioctl;
70# For kernel < 6.13
71allow netd self:netlink_tcpdiag_socket { nlmsg_read nlmsg_write };
72# For kernel >= 6.13
73allow netd self:netlink_tcpdiag_socket nlmsg;
Inseob Kim75806ef2024-03-27 17:18:41 +090074allow netd self:netlink_generic_socket create_socket_perms_no_ioctl;
75allow netd self:netlink_netfilter_socket create_socket_perms_no_ioctl;
76allow netd shell_exec:file rx_file_perms;
77allow netd system_file:file x_file_perms;
78not_full_treble(`allow netd vendor_file:file x_file_perms;')
79allow netd devpts:chr_file rw_file_perms;
80
81# Acquire advisory lock on /system/etc/xtables.lock. If this file doesn't
82# exist, suppress the denial.
83allow netd system_file:file lock;
84dontaudit netd system_file:dir write;
85
Inseob Kim75806ef2024-03-27 17:18:41 +090086r_dir_file(netd, proc_net_type)
87# For /proc/sys/net/ipv[46]/route/flush.
88allow netd proc_net_type:file rw_file_perms;
89
90# Enables PppController and interface enumeration (among others)
91allow netd sysfs:dir r_dir_perms;
92r_dir_file(netd, sysfs_net)
93
94# Allows setting interface MTU
95allow netd sysfs_net:file w_file_perms;
96
97# TODO: added to match above sysfs rule. Remove me?
98allow netd sysfs_usb:file write;
99
100r_dir_file(netd, cgroup_v2)
101
102# TODO: netd previously thought it needed these permissions to do WiFi related
103# work. However, after all the WiFi stuff is gone, we still need them.
104# Why?
105allow netd self:global_capability_class_set { dac_override dac_read_search chown };
106
107# Needed to update /data/misc/net/rt_tables
108allow netd net_data_file:file create_file_perms;
109allow netd net_data_file:dir rw_dir_perms;
110allow netd self:global_capability_class_set fowner;
111
112# Needed to lock the iptables lock.
113allow netd system_file:file lock;
114
115# Allow netd to spawn dnsmasq in it's own domain
116allow netd dnsmasq:process { sigkill signal };
117
118# Allow netd to publish a binder service and make binder calls.
119binder_use(netd)
120add_service(netd, netd_service)
121add_service(netd, dnsresolver_service)
122add_service(netd, mdns_service)
123allow netd dumpstate:fifo_file { getattr write };
124
125# Allow netd to call into the system server so it can check permissions.
126allow netd system_server:binder call;
127allow netd permission_service:service_manager find;
128
129# Allow netd to talk to the framework service which collects netd events.
130allow netd netd_listener_service:service_manager find;
131
132# Allow netd to operate on sockets that are passed to it.
133allow netd netdomain:{
134 icmp_socket
135 tcp_socket
136 udp_socket
137 rawip_socket
138 tun_socket
139} { read write getattr setattr getopt setopt };
140allow netd netdomain:fd use;
141
142# give netd permission to read and write netlink xfrm
Bo Hub55aaff2024-12-01 21:14:32 +0000143allow netd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read };
Inseob Kim75806ef2024-03-27 17:18:41 +0900144
145# Allow netd to register as hal server.
146add_hwservice(netd, system_net_netd_hwservice)
147hwbinder_use(netd)
148
149# AIDL hal server
150binder_call(system_net_netd_service, servicemanager)
151add_service(netd, system_net_netd_service)
152
153###
154### Neverallow rules
155###
156### netd should NEVER do any of this
157
158# Block device access.
159neverallow netd dev_type:blk_file { read write };
160
161# ptrace any other app
162neverallow netd { domain }:process ptrace;
163
164# Write to /system.
165neverallow netd system_file_type:dir_file_class_set write;
166
167# Write to files in /data/data or system files on /data
168neverallow netd { app_data_file_type system_data_file }:dir_file_class_set write;
169
170# only system_server, dumpstate and network stack app may find netd service
171neverallow {
172 domain
173 -system_server
174 -dumpstate
175 -network_stack
176 -netd
177 -netutils_wrapper
178} netd_service:service_manager find;
179
180# only system_server, dumpstate and network stack app may find dnsresolver service
181neverallow {
182 domain
183 -system_server
184 -dumpstate
185 -network_stack
186 -netd
187 -netutils_wrapper
188} dnsresolver_service:service_manager find;
189
190# only system_server, dumpstate and network stack app may find mdns service
191neverallow {
192 domain
193 -system_server
194 -dumpstate
195 -network_stack
196 -netd
197 -netutils_wrapper
198} mdns_service:service_manager find;
199
200# apps may not interact with netd over binder.
201neverallow { appdomain -network_stack } netd:binder call;
202neverallow netd { appdomain -network_stack userdebug_or_eng(`-su') }:binder call;
203
204# If an already existing file is opened with O_CREATE, the kernel might generate
205# a false report of a create denial. Silence these denials and make sure that
206# inappropriate permissions are not granted.
207neverallow netd proc_net:dir no_w_dir_perms;
208dontaudit netd proc_net:dir write;
209
210neverallow netd sysfs_net:dir no_w_dir_perms;
211dontaudit netd sysfs_net:dir write;
212
213# Netd should not have SYS_ADMIN privs.
214neverallow netd self:capability sys_admin;
215dontaudit netd self:capability sys_admin;
216
217# Netd should not have SYS_MODULE privs, nor should it be requesting module loads
218# (things it requires should be built directly into the kernel)
219dontaudit netd self:capability sys_module;
220
221dontaudit netd appdomain:unix_stream_socket { read write };
222
Inseob Kim55e5c9b2020-03-04 17:20:35 +0900223# persist.netd.stable_secret contains RFC 7217 secret key which should never be
224# leaked to other processes. Make sure it never leaks.
225neverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms;
226
227# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
228# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
229neverallow { domain -netd -init } netd_stable_secret_prop:property_service set;