Roshan Pius | a483b5d | 2019-11-22 09:33:37 -0800 | [diff] [blame] | 1 | # Networking service app |
Steven Moreland | 6598175 | 2022-02-10 00:32:44 +0000 | [diff] [blame] | 2 | typeattribute network_stack coredomain; |
| 3 | typeattribute network_stack mlstrustedsubject; |
| 4 | typeattribute network_stack bpfdomain; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 5 | |
| 6 | app_domain(network_stack); |
| 7 | net_domain(network_stack); |
| 8 | |
| 9 | allow network_stack self:global_capability_class_set { |
| 10 | net_admin |
| 11 | net_bind_service |
| 12 | net_broadcast |
| 13 | net_raw |
| 14 | }; |
| 15 | |
| 16 | # Allow access to net_admin ioctl, DHCP server uses SIOCSARP |
| 17 | allowxperm network_stack self:udp_socket ioctl priv_sock_ioctls; |
| 18 | |
| 19 | # The DhcpClient uses packet_sockets |
| 20 | allow network_stack self:packet_socket create_socket_perms_no_ioctl; |
| 21 | |
Remi NGUYEN VAN | 780fbad | 2019-01-28 13:08:42 +0900 | [diff] [blame] | 22 | # Monitor neighbors via netlink. |
| 23 | allow network_stack self:netlink_route_socket nlmsg_write; |
| 24 | |
Patrick Rohr | ab02397 | 2022-05-19 21:34:31 -0700 | [diff] [blame] | 25 | # Use netlink uevent sockets. |
| 26 | allow network_stack self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; |
| 27 | |
| 28 | # give network_stack the same netlink permissions as netd |
| 29 | allow network_stack self:netlink_nflog_socket create_socket_perms_no_ioctl; |
| 30 | allow network_stack self:netlink_socket create_socket_perms_no_ioctl; |
| 31 | allow network_stack self:netlink_generic_socket create_socket_perms_no_ioctl; |
| 32 | |
Remi NGUYEN VAN | d0f65ce | 2019-01-11 07:35:17 +0900 | [diff] [blame] | 33 | allow network_stack app_api_service:service_manager find; |
Luke Huang | 524f25e | 2019-02-25 20:12:15 +0800 | [diff] [blame] | 34 | allow network_stack dnsresolver_service:service_manager find; |
paulhu | 70b0a77 | 2021-12-09 11:49:23 +0800 | [diff] [blame] | 35 | allow network_stack mdns_service:service_manager find; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 36 | allow network_stack netd_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 37 | allow network_stack network_watchlist_service:service_manager find; |
Remi NGUYEN VAN | fd758cb | 2019-01-15 16:57:32 +0900 | [diff] [blame] | 38 | allow network_stack radio_service:service_manager find; |
paulhu | c471e4c | 2021-04-14 18:24:50 +0800 | [diff] [blame] | 39 | allow network_stack system_config_service:service_manager find; |
Xiao Ma | c06f0f6 | 2019-03-08 12:33:03 +0900 | [diff] [blame] | 40 | allow network_stack radio_data_file:dir create_dir_perms; |
| 41 | allow network_stack radio_data_file:file create_file_perms; |
Remi NGUYEN VAN | 5f3ba92 | 2018-11-14 17:07:41 +0900 | [diff] [blame] | 42 | |
| 43 | binder_call(network_stack, netd); |
Roshan Pius | 1086c7d | 2019-10-01 13:49:21 -0700 | [diff] [blame] | 44 | |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 45 | # in order to invoke side effect of close() on such a socket calling synchronize_rcu() |
| 46 | # TODO: Remove this permission when 4.9 kernel is deprecated. |
| 47 | allow network_stack self:key_socket create; |
Maciej Żenczykowski | e70c300 | 2021-04-09 07:29:29 -0700 | [diff] [blame] | 48 | # Java's Os.close() in libcore/luni/src/main/java/libcore/io/BlockGuardOs.java;l=100 |
| 49 | # calls if (fd.isSocket$()) if (isLingerSocket(fd)) ... |
| 50 | dontaudit network_stack self:key_socket getopt; |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 51 | |
| 52 | # Grant read permission of connectivity namespace system property prefix. |
| 53 | get_prop(network_stack, device_config_connectivity_prop) |
| 54 | |
Chiachang Wang | e063585 | 2019-10-12 20:49:23 +0900 | [diff] [blame] | 55 | # Create/use netlink_tcpdiag_socket to get tcp info |
| 56 | allow network_stack self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write }; |
markchien | e9bb9a4 | 2019-11-21 12:58:31 +0800 | [diff] [blame] | 57 | ############### Tethering Service app - Tethering.apk ############## |
| 58 | hal_client_domain(network_stack, hal_tetheroffload) |
| 59 | # Create and share netlink_netfilter_sockets for tetheroffload. |
| 60 | allow network_stack self:netlink_netfilter_socket create_socket_perms_no_ioctl; |
markchien | c5aa484 | 2019-12-12 12:54:57 +0800 | [diff] [blame] | 61 | allow network_stack network_stack_service:service_manager find; |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 62 | # allow Tethering(network_stack process) to run/update/read the eBPF maps to offload tethering traffic by eBPF. |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 63 | allow network_stack { fs_bpf fs_bpf_tethering }:dir search; |
| 64 | allow network_stack { fs_bpf fs_bpf_tethering }:file { read write }; |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 65 | allow network_stack bpfloader:bpf { map_read map_write prog_run }; |
Maciej Żenczykowski | 5a7e49e | 2020-12-02 20:45:36 -0800 | [diff] [blame] | 66 | |
Benedict Wong | b25b4bf | 2022-05-20 20:55:32 +0000 | [diff] [blame] | 67 | # Use XFRM (IPsec) netlink sockets |
| 68 | allow network_stack self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read }; |
| 69 | |
Patrick Rohr | 02b5535 | 2022-05-31 20:29:55 -0700 | [diff] [blame] | 70 | # tun device used for 3rd party vpn apps and test network manager |
| 71 | allow network_stack tun_device:chr_file rw_file_perms; |
| 72 | allowxperm network_stack tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF TUNSETLINK TUNSETCARRIER }; |
| 73 | |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 74 | # Only the bpfloader and the network_stack should ever touch 'fs_bpf_tethering' programs/maps. |
Maciej Żenczykowski | d68cb48 | 2021-01-29 14:36:32 -0800 | [diff] [blame] | 75 | # Unfortunately init/vendor_init have all sorts of extra privs |
Maciej Żenczykowski | c23fb98 | 2021-03-16 03:03:53 -0700 | [diff] [blame] | 76 | neverallow { domain -bpfloader -init -network_stack -vendor_init } fs_bpf_tethering:dir ~getattr; |
| 77 | neverallow { domain -bpfloader -init -network_stack -vendor_init } fs_bpf_tethering:file *; |
Xiao Ma | 2d6c9f0 | 2021-02-02 10:27:38 +0000 | [diff] [blame] | 78 | |
Maciej Żenczykowski | c23fb98 | 2021-03-16 03:03:53 -0700 | [diff] [blame] | 79 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:dir ~{ getattr open read search setattr }; |
| 80 | neverallow { domain -bpfloader -network_stack } fs_bpf_tethering:file ~{ map open read setattr }; |