xref: /aosp_15_r20/system/sepolicy/private/netd.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1typeattribute netd coredomain;
2typeattribute netd bpfdomain;
3
4init_daemon_domain(netd)
5
6# Allow netd to spawn dnsmasq in it's own domain
7domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8
9allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:dir search;
10allow netd { fs_bpf fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_vendor }:file { getattr read };
11allow netd { fs_bpf                      fs_bpf_netd_shared               }:file write;
12
13# give netd permission to setup iptables rule with xt_bpf, attach program to cgroup,
14# create maps, and read/write maps created by bpfloader, itself and NS/SS mainline networking
15allow netd bpfloader:bpf prog_run;
16allow netd self:bpf map_create;
17allow netd { bpfloader netd network_stack system_server }:bpf { map_read map_write };
18
19# in order to invoke side effect of close() on such a socket calling synchronize_rcu()
20# TODO: Still needed as of kernel 6.6-rc1 - see BpfUtils.h synchronizeKernelRCU()
21# TODO: Remove this after we remove all bpf interactions from netd.
22allow netd self:key_socket create;
23
24set_prop(netd, ctl_mdnsd_prop)
25set_prop(netd, netd_stable_secret_prop)
26
27get_prop(netd, adbd_config_prop)
28get_prop(netd, hwservicemanager_prop)
29get_prop(netd, device_config_netd_native_prop)
30
31# Allow netd to write to statsd.
32unix_socket_send(netd, statsdw, statsd)
33
34# Allow netd to send callbacks to network_stack
35binder_call(netd, network_stack)
36
37# Allow netd to send dump info to dumpstate
38allow netd dumpstate:fd use;
39allow netd dumpstate:fifo_file { getattr write };
40
41net_domain(netd)
42# Connect to mdnsd via mdnsd socket.
43unix_socket_connect(netd, mdnsd, mdnsd)
44# in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
45allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
46
47r_dir_file(netd, cgroup)
48
49allow netd system_server:fd use;
50
51allow netd self:global_capability_class_set { net_admin net_raw kill };
52# Note: fsetid is deliberately not included above. fsetid checks are
53# triggered by chmod on a directory or file owned by a group other
54# than one of the groups assigned to the current process to see if
55# the setgid bit should be cleared, regardless of whether the setgid
56# bit was even set.  We do not appear to truly need this capability
57# for netd to operate.
58dontaudit netd self:global_capability_class_set fsetid;
59
60# Allow netd to open /dev/tun, set it up and pass it to clatd
61allow netd tun_device:chr_file rw_file_perms;
62allowxperm netd tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF };
63allow netd self:tun_socket create;
64
65allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
66allow netd self:netlink_route_socket nlmsg_write;
67allow netd self:netlink_nflog_socket create_socket_perms_no_ioctl;
68allow netd self:netlink_socket create_socket_perms_no_ioctl;
69allow netd self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read nlmsg_write };
70allow netd self:netlink_generic_socket create_socket_perms_no_ioctl;
71allow netd self:netlink_netfilter_socket create_socket_perms_no_ioctl;
72allow netd shell_exec:file rx_file_perms;
73allow netd system_file:file x_file_perms;
74not_full_treble(`allow netd vendor_file:file x_file_perms;')
75allow netd devpts:chr_file rw_file_perms;
76
77# Acquire advisory lock on /system/etc/xtables.lock. If this file doesn't
78# exist, suppress the denial.
79allow netd system_file:file lock;
80dontaudit netd system_file:dir write;
81
82r_dir_file(netd, proc_net_type)
83# For /proc/sys/net/ipv[46]/route/flush.
84allow netd proc_net_type:file rw_file_perms;
85
86# Enables PppController and interface enumeration (among others)
87allow netd sysfs:dir r_dir_perms;
88r_dir_file(netd, sysfs_net)
89
90# Allows setting interface MTU
91allow netd sysfs_net:file w_file_perms;
92
93# TODO: added to match above sysfs rule. Remove me?
94allow netd sysfs_usb:file write;
95
96r_dir_file(netd, cgroup_v2)
97
98# TODO: netd previously thought it needed these permissions to do WiFi related
99#       work.  However, after all the WiFi stuff is gone, we still need them.
100#       Why?
101allow netd self:global_capability_class_set { dac_override dac_read_search chown };
102
103# Needed to update /data/misc/net/rt_tables
104allow netd net_data_file:file create_file_perms;
105allow netd net_data_file:dir rw_dir_perms;
106allow netd self:global_capability_class_set fowner;
107
108# Needed to lock the iptables lock.
109allow netd system_file:file lock;
110
111# Allow netd to spawn dnsmasq in it's own domain
112allow netd dnsmasq:process { sigkill signal };
113
114# Allow netd to publish a binder service and make binder calls.
115binder_use(netd)
116add_service(netd, netd_service)
117add_service(netd, dnsresolver_service)
118add_service(netd, mdns_service)
119allow netd dumpstate:fifo_file  { getattr write };
120
121# Allow netd to call into the system server so it can check permissions.
122allow netd system_server:binder call;
123allow netd permission_service:service_manager find;
124
125# Allow netd to talk to the framework service which collects netd events.
126allow netd netd_listener_service:service_manager find;
127
128# Allow netd to operate on sockets that are passed to it.
129allow netd netdomain:{
130  icmp_socket
131  tcp_socket
132  udp_socket
133  rawip_socket
134  tun_socket
135} { read write getattr setattr getopt setopt };
136allow netd netdomain:fd use;
137
138# give netd permission to read and write netlink xfrm
139allow netd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read };
140
141# Allow netd to register as hal server.
142add_hwservice(netd, system_net_netd_hwservice)
143hwbinder_use(netd)
144
145# AIDL hal server
146binder_call(system_net_netd_service, servicemanager)
147add_service(netd, system_net_netd_service)
148
149###
150### Neverallow rules
151###
152### netd should NEVER do any of this
153
154# Block device access.
155neverallow netd dev_type:blk_file { read write };
156
157# ptrace any other app
158neverallow netd { domain }:process ptrace;
159
160# Write to /system.
161neverallow netd system_file_type:dir_file_class_set write;
162
163# Write to files in /data/data or system files on /data
164neverallow netd { app_data_file_type system_data_file }:dir_file_class_set write;
165
166# only system_server, dumpstate and network stack app may find netd service
167neverallow {
168    domain
169    -system_server
170    -dumpstate
171    -network_stack
172    -netd
173    -netutils_wrapper
174} netd_service:service_manager find;
175
176# only system_server, dumpstate and network stack app may find dnsresolver service
177neverallow {
178    domain
179    -system_server
180    -dumpstate
181    -network_stack
182    -netd
183    -netutils_wrapper
184} dnsresolver_service:service_manager find;
185
186# only system_server, dumpstate and network stack app may find mdns service
187neverallow {
188    domain
189    -system_server
190    -dumpstate
191    -network_stack
192    -netd
193    -netutils_wrapper
194} mdns_service:service_manager find;
195
196# apps may not interact with netd over binder.
197neverallow { appdomain -network_stack } netd:binder call;
198neverallow netd { appdomain -network_stack userdebug_or_eng(`-su') }:binder call;
199
200# If an already existing file is opened with O_CREATE, the kernel might generate
201# a false report of a create denial. Silence these denials and make sure that
202# inappropriate permissions are not granted.
203neverallow netd proc_net:dir no_w_dir_perms;
204dontaudit netd proc_net:dir write;
205
206neverallow netd sysfs_net:dir no_w_dir_perms;
207dontaudit netd sysfs_net:dir write;
208
209# Netd should not have SYS_ADMIN privs.
210neverallow netd self:capability sys_admin;
211dontaudit netd self:capability sys_admin;
212
213# Netd should not have SYS_MODULE privs, nor should it be requesting module loads
214# (things it requires should be built directly into the kernel)
215dontaudit netd self:capability sys_module;
216
217dontaudit netd appdomain:unix_stream_socket { read write };
218
219# persist.netd.stable_secret contains RFC 7217 secret key which should never be
220# leaked to other processes. Make sure it never leaks.
221neverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms;
222
223# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
224# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
225neverallow { domain -netd -init } netd_stable_secret_prop:property_service set;
226