Home
last modified time | relevance | path

Searched refs:netd (Results 1 – 25 of 120) sorted by relevance

12345

/system/sepolicy/prebuilts/api/28.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 # Access objects inherited from netd.
10 allow clatd netd:fd use;
11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/27.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
12 allow netd self:capability { net_admin net_raw kill };
18 # for netd to operate.
19 dontaudit netd self:capability fsetid;
21 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 # Access objects inherited from netd.
10 allow clatd netd:fd use;
11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te12 # Access objects inherited from netd.
13 allow clatd netd:fd use;
14 allow clatd netd:fifo_file { read write };
16 allow clatd netd:netlink_kobject_uevent_socket { read write };
17 allow clatd netd:netlink_nflog_socket { read write };
18 allow clatd netd:netlink_route_socket { read write };
19 allow clatd netd:udp_socket { read write };
20 allow clatd netd:unix_stream_socket { read write };
21 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te12 # Access objects inherited from netd.
13 allow clatd netd:fd use;
14 allow clatd netd:fifo_file { read write };
16 allow clatd netd:netlink_kobject_uevent_socket { read write };
17 allow clatd netd:netlink_nflog_socket { read write };
18 allow clatd netd:netlink_route_socket { read write };
19 allow clatd netd:udp_socket { read write };
20 allow clatd netd:unix_stream_socket { read write };
21 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/26.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
12 allow netd self:capability { net_admin net_raw kill };
18 # for netd to operate.
19 dontaudit netd self:capability fsetid;
21 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 # Access objects inherited from netd.
10 allow clatd netd:fd use;
11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
13 allow netd bpfloader:bpf { prog_run map_read map_write };
17 allow netd self:key_socket create;
19 get_prop(netd, bpf_progs_loaded_prop)
[all …]
Dbug_map1 dnsmasq netd fifo_file 77868789
2 dnsmasq netd unix_stream_socket 77868789
20 netd priv_app unix_stream_socket 77870037
21 netd untrusted_app unix_stream_socket 77870037
22 netd untrusted_app_25 unix_stream_socket 77870037
23 netd untrusted_app_27 unix_stream_socket 77870037
/system/sepolicy/prebuilts/api/29.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
13 allow netd bpfloader:bpf { prog_run map_read map_write };
17 allow netd self:key_socket create;
19 get_prop(netd, bpf_progs_loaded_prop)
[all …]
Dbug_map1 dnsmasq netd fifo_file 77868789
2 dnsmasq netd unix_stream_socket 77868789
20 netd priv_app unix_stream_socket 77870037
21 netd untrusted_app unix_stream_socket 77870037
22 netd untrusted_app_25 unix_stream_socket 77870037
23 netd untrusted_app_27 unix_stream_socket 77870037
/system/sepolicy/prebuilts/api/28.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # Allow netd to start bpfloader_exec in its own domain
12 domain_auto_trans(netd, bpfloader_exec, bpfloader)
14 # give netd permission to setup iptables rule with xt_bpf
15 allow netd bpfloader:bpf prog_run;
Dbpfloader.te11 # These permission is required for pin bpf program for netd.
16 allow bpfloader netd:fd use;
18 # Use pinned bpf map files from netd.
19 allow bpfloader netd:bpf { map_read map_write };
24 neverallow { domain -bpfloader -netd -netutils_wrapper} *:bpf prog_run;
25 neverallow { domain -netd -bpfloader } bpfloader_exec:file { execute execute_no_trans };
27 # only system_server, netd and bpfloader can read/write the bpf maps
28 neverallow { domain -system_server -netd -bpfloader} netd:bpf { map_read map_write };
/system/sepolicy/prebuilts/api/27.0/private/
Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)
/system/sepolicy/prebuilts/api/26.0/private/
Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)
/system/netd/tests/benchmarks/
DAndroid.bp21 include_dirs: ["system/netd/server/binder"],
24 "system/netd/include",
25 "system/netd/client",
26 "system/netd/resolv/include",
27 "system/netd/server",
28 "system/netd/server/binder",
29 "system/netd/resolv/dns_responder",
/system/hardware/interfaces/net/netd/1.1/vts/functional/
DVtsHalNetNetdV1_1TargetTest.cpp34 using android::system::net::netd::V1_1::INetd;
99 sp<INetd> netd; member in NetdHidlTest
130 netd = ::testing::VtsHalHidlTargetTestBase::getService<INetd>( in SetUp()
133 ASSERT_NE(netd, nullptr) << "Could not get HIDL instance"; in SetUp()
138 netd->createOemNetwork([&](net_handle_t n, uint32_t p, INetd::StatusCode s) { in SetUp()
149 virtual void TearDown() override { netd->destroyOemNetwork(mNetHandle); } in TearDown()
154 netd->addRouteToOemNetwork(handle, iface, destination, nexthop); in expectAddRoute()
165 netd->removeRouteFromOemNetwork(handle, iface, destination, nexthop); in expectRemoveRoute()
187 Return<INetd::StatusCode> retStatus = netd->addInterfaceToOemNetwork(mNetHandle, sIfaceName); in TEST_F()
193 retStatus = netd->addInterfaceToOemNetwork(mNetHandle, sIfaceName); in TEST_F()
[all …]

12345