xref: /aosp_15_r20/system/sepolicy/prebuilts/api/31.0/private/netd.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1*e4a36f41SAndroid Build Coastguard Workertypeattribute netd coredomain;
2*e4a36f41SAndroid Build Coastguard Worker
3*e4a36f41SAndroid Build Coastguard Workerinit_daemon_domain(netd)
4*e4a36f41SAndroid Build Coastguard Worker
5*e4a36f41SAndroid Build Coastguard Worker# Allow netd to spawn dnsmasq in it's own domain
6*e4a36f41SAndroid Build Coastguard Workerdomain_auto_trans(netd, dnsmasq_exec, dnsmasq)
7*e4a36f41SAndroid Build Coastguard Worker
8*e4a36f41SAndroid Build Coastguard Worker# Allow netd to start clatd in its own domain and kill it
9*e4a36f41SAndroid Build Coastguard Workerdomain_auto_trans(netd, clatd_exec, clatd)
10*e4a36f41SAndroid Build Coastguard Workerallow netd clatd:process signal;
11*e4a36f41SAndroid Build Coastguard Worker
12*e4a36f41SAndroid Build Coastguard Worker# give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
13*e4a36f41SAndroid Build Coastguard Worker# the map created by bpfloader
14*e4a36f41SAndroid Build Coastguard Workerallow netd bpfloader:bpf { prog_run map_read map_write };
15*e4a36f41SAndroid Build Coastguard Worker
16*e4a36f41SAndroid Build Coastguard Worker# in order to invoke side effect of close() on such a socket calling synchronize_rcu()
17*e4a36f41SAndroid Build Coastguard Worker# TODO: Remove this permission when 4.9 kernel is deprecated.
18*e4a36f41SAndroid Build Coastguard Workerallow netd self:key_socket create;
19*e4a36f41SAndroid Build Coastguard Worker
20*e4a36f41SAndroid Build Coastguard Workerset_prop(netd, ctl_mdnsd_prop)
21*e4a36f41SAndroid Build Coastguard Workerset_prop(netd, netd_stable_secret_prop)
22*e4a36f41SAndroid Build Coastguard Worker
23*e4a36f41SAndroid Build Coastguard Workerget_prop(netd, adbd_config_prop)
24*e4a36f41SAndroid Build Coastguard Workerget_prop(netd, bpf_progs_loaded_prop)
25*e4a36f41SAndroid Build Coastguard Workerget_prop(netd, hwservicemanager_prop)
26*e4a36f41SAndroid Build Coastguard Workerget_prop(netd, device_config_netd_native_prop)
27*e4a36f41SAndroid Build Coastguard Worker
28*e4a36f41SAndroid Build Coastguard Worker# Allow netd to write to statsd.
29*e4a36f41SAndroid Build Coastguard Workerunix_socket_send(netd, statsdw, statsd)
30*e4a36f41SAndroid Build Coastguard Worker
31*e4a36f41SAndroid Build Coastguard Worker# Allow netd to send callbacks to network_stack
32*e4a36f41SAndroid Build Coastguard Workerbinder_call(netd, network_stack)
33*e4a36f41SAndroid Build Coastguard Worker
34*e4a36f41SAndroid Build Coastguard Worker# Allow netd to send dump info to dumpstate
35*e4a36f41SAndroid Build Coastguard Workerallow netd dumpstate:fd use;
36*e4a36f41SAndroid Build Coastguard Workerallow netd dumpstate:fifo_file { getattr write };
37*e4a36f41SAndroid Build Coastguard Worker
38*e4a36f41SAndroid Build Coastguard Worker# persist.netd.stable_secret contains RFC 7217 secret key which should never be
39*e4a36f41SAndroid Build Coastguard Worker# leaked to other processes. Make sure it never leaks.
40*e4a36f41SAndroid Build Coastguard Workerneverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms;
41*e4a36f41SAndroid Build Coastguard Worker
42*e4a36f41SAndroid Build Coastguard Worker# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
43*e4a36f41SAndroid Build Coastguard Worker# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
44*e4a36f41SAndroid Build Coastguard Workerneverallow { domain -netd -init } netd_stable_secret_prop:property_service set;
45