1typeattribute netd coredomain; 2typeattribute netd bpfdomain; 3 4init_daemon_domain(netd) 5 6# Allow netd to spawn dnsmasq in it's own domain 7domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 8 9allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:dir search; 10allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:file { getattr read }; 11allow netd { fs_bpf fs_bpf_netd_shared }:file write; 12 13# give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, 14# create maps, and read/write maps created by bpfloader, itself and NS/SS mainline networking 15allow netd bpfloader:bpf prog_run; 16allow netd self:bpf map_create; 17allow netd { bpfloader netd network_stack system_server }:bpf { map_read map_write }; 18 19# in order to invoke side effect of close() on such a socket calling synchronize_rcu() 20# TODO: Still needed as of kernel 6.6-rc1 - see BpfUtils.h synchronizeKernelRCU() 21# TODO: Remove this after we remove all bpf interactions from netd. 22allow netd self:key_socket create; 23 24set_prop(netd, ctl_mdnsd_prop) 25set_prop(netd, netd_stable_secret_prop) 26 27get_prop(netd, adbd_config_prop) 28get_prop(netd, hwservicemanager_prop) 29get_prop(netd, device_config_netd_native_prop) 30 31# Allow netd to write to statsd. 32unix_socket_send(netd, statsdw, statsd) 33 34# Allow netd to send callbacks to network_stack 35binder_call(netd, network_stack) 36 37# Allow netd to send dump info to dumpstate 38allow netd dumpstate:fd use; 39allow netd dumpstate:fifo_file { getattr write }; 40 41net_domain(netd) 42# Connect to mdnsd via mdnsd socket. 43unix_socket_connect(netd, mdnsd, mdnsd) 44# in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls. 45allowxperm netd self:udp_socket ioctl priv_sock_ioctls; 46 47r_dir_file(netd, cgroup) 48 49allow netd system_server:fd use; 50 51allow netd self:global_capability_class_set { net_admin net_raw kill }; 52# Note: fsetid is deliberately not included above. fsetid checks are 53# triggered by chmod on a directory or file owned by a group other 54# than one of the groups assigned to the current process to see if 55# the setgid bit should be cleared, regardless of whether the setgid 56# bit was even set. We do not appear to truly need this capability 57# for netd to operate. 58dontaudit netd self:global_capability_class_set fsetid; 59 60# Allow netd to open /dev/tun, set it up and pass it to clatd 61allow netd tun_device:chr_file rw_file_perms; 62allowxperm netd tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF }; 63allow netd self:tun_socket create; 64 65allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; 66allow netd self:netlink_route_socket nlmsg_write; 67allow netd self:netlink_nflog_socket create_socket_perms_no_ioctl; 68allow netd self:netlink_socket create_socket_perms_no_ioctl; 69allow netd self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write }; 70allow netd self:netlink_generic_socket create_socket_perms_no_ioctl; 71allow netd self:netlink_netfilter_socket create_socket_perms_no_ioctl; 72allow netd shell_exec:file rx_file_perms; 73allow netd system_file:file x_file_perms; 74not_full_treble(`allow netd vendor_file:file x_file_perms;') 75allow netd devpts:chr_file rw_file_perms; 76 77# Acquire advisory lock on /system/etc/xtables.lock. If this file doesn't 78# exist, suppress the denial. 79allow netd system_file:file lock; 80dontaudit netd system_file:dir write; 81 82r_dir_file(netd, proc_net_type) 83# For /proc/sys/net/ipv[46]/route/flush. 84allow netd proc_net_type:file rw_file_perms; 85 86# Enables PppController and interface enumeration (among others) 87allow netd sysfs:dir r_dir_perms; 88r_dir_file(netd, sysfs_net) 89 90# Allows setting interface MTU 91allow netd sysfs_net:file w_file_perms; 92 93# TODO: added to match above sysfs rule. Remove me? 94allow netd sysfs_usb:file write; 95 96r_dir_file(netd, cgroup_v2) 97 98# TODO: netd previously thought it needed these permissions to do WiFi related 99# work. However, after all the WiFi stuff is gone, we still need them. 100# Why? 101allow netd self:global_capability_class_set { dac_override dac_read_search chown }; 102 103# Needed to update /data/misc/net/rt_tables 104allow netd net_data_file:file create_file_perms; 105allow netd net_data_file:dir rw_dir_perms; 106allow netd self:global_capability_class_set fowner; 107 108# Needed to lock the iptables lock. 109allow netd system_file:file lock; 110 111# Allow netd to spawn dnsmasq in it's own domain 112allow netd dnsmasq:process { sigkill signal }; 113 114# Allow netd to publish a binder service and make binder calls. 115binder_use(netd) 116add_service(netd, netd_service) 117add_service(netd, dnsresolver_service) 118add_service(netd, mdns_service) 119allow netd dumpstate:fifo_file { getattr write }; 120 121# Allow netd to call into the system server so it can check permissions. 122allow netd system_server:binder call; 123allow netd permission_service:service_manager find; 124 125# Allow netd to talk to the framework service which collects netd events. 126allow netd netd_listener_service:service_manager find; 127 128# Allow netd to operate on sockets that are passed to it. 129allow netd netdomain:{ 130 icmp_socket 131 tcp_socket 132 udp_socket 133 rawip_socket 134 tun_socket 135} { read write getattr setattr getopt setopt }; 136allow netd netdomain:fd use; 137 138# give netd permission to read and write netlink xfrm 139allow netd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read }; 140 141# Allow netd to register as hal server. 142add_hwservice(netd, system_net_netd_hwservice) 143hwbinder_use(netd) 144 145# AIDL hal server 146binder_call(system_net_netd_service, servicemanager) 147add_service(netd, system_net_netd_service) 148 149### 150### Neverallow rules 151### 152### netd should NEVER do any of this 153 154# Block device access. 155neverallow netd dev_type:blk_file { read write }; 156 157# ptrace any other app 158neverallow netd { domain }:process ptrace; 159 160# Write to /system. 161neverallow netd system_file_type:dir_file_class_set write; 162 163# Write to files in /data/data or system files on /data 164neverallow netd { app_data_file_type system_data_file }:dir_file_class_set write; 165 166# only system_server, dumpstate and network stack app may find netd service 167neverallow { 168 domain 169 -system_server 170 -dumpstate 171 -network_stack 172 -netd 173 -netutils_wrapper 174} netd_service:service_manager find; 175 176# only system_server, dumpstate and network stack app may find dnsresolver service 177neverallow { 178 domain 179 -system_server 180 -dumpstate 181 -network_stack 182 -netd 183 -netutils_wrapper 184} dnsresolver_service:service_manager find; 185 186# only system_server, dumpstate and network stack app may find mdns service 187neverallow { 188 domain 189 -system_server 190 -dumpstate 191 -network_stack 192 -netd 193 -netutils_wrapper 194} mdns_service:service_manager find; 195 196# apps may not interact with netd over binder. 197neverallow { appdomain -network_stack } netd:binder call; 198neverallow netd { appdomain -network_stack userdebug_or_eng(`-su') }:binder call; 199 200# If an already existing file is opened with O_CREATE, the kernel might generate 201# a false report of a create denial. Silence these denials and make sure that 202# inappropriate permissions are not granted. 203neverallow netd proc_net:dir no_w_dir_perms; 204dontaudit netd proc_net:dir write; 205 206neverallow netd sysfs_net:dir no_w_dir_perms; 207dontaudit netd sysfs_net:dir write; 208 209# Netd should not have SYS_ADMIN privs. 210neverallow netd self:capability sys_admin; 211dontaudit netd self:capability sys_admin; 212 213# Netd should not have SYS_MODULE privs, nor should it be requesting module loads 214# (things it requires should be built directly into the kernel) 215dontaudit netd self:capability sys_module; 216 217dontaudit netd appdomain:unix_stream_socket { read write }; 218 219# persist.netd.stable_secret contains RFC 7217 secret key which should never be 220# leaked to other processes. Make sure it never leaks. 221neverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms; 222 223# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret, 224# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy. 225neverallow { domain -netd -init } netd_stable_secret_prop:property_service set; 226