Home
last modified time | relevance | path

Searched refs:netd (Results 1 – 25 of 181) sorted by relevance

12345678

/system/sepolicy/prebuilts/api/28.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 # Access objects inherited from netd.
10 allow clatd netd:fd use;
11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/30.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/31.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/27.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
12 allow netd self:capability { net_admin net_raw kill };
18 # for netd to operate.
19 dontaudit netd self:capability fsetid;
21 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
13 allow netd self:global_capability_class_set { net_admin net_raw kill };
19 # for netd to operate.
20 dontaudit netd self:global_capability_class_set fsetid;
22 # Allow netd to open /dev/tun, set it up and pass it to clatd
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/26.0/public/
Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
7 allowxperm netd self:udp_socket ioctl priv_sock_ioctls;
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
12 allow netd self:capability { net_admin net_raw kill };
18 # for netd to operate.
19 dontaudit netd self:capability fsetid;
21 allow netd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
[all …]
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 # Access objects inherited from netd.
10 allow clatd netd:fd use;
11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/31.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain and kill it
9 domain_auto_trans(netd, clatd_exec, clatd)
10 allow netd clatd:process signal;
12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
14 allow netd bpfloader:bpf { prog_run map_read map_write };
18 allow netd self:key_socket create;
[all …]
/system/sepolicy/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain and kill it
9 domain_auto_trans(netd, clatd_exec, clatd)
10 allow netd clatd:process signal;
12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
14 allow netd bpfloader:bpf { prog_run map_read map_write };
18 allow netd self:key_socket create;
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain and kill it
9 domain_auto_trans(netd, clatd_exec, clatd)
10 allow netd clatd:process signal;
12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
14 allow netd bpfloader:bpf { prog_run map_read map_write };
18 allow netd self:key_socket create;
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
13 allow netd bpfloader:bpf { prog_run map_read map_write };
17 allow netd self:key_socket create;
19 get_prop(netd, bpf_progs_loaded_prop)
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # Allow netd to start bpfloader_exec in its own domain
12 domain_auto_trans(netd, bpfloader_exec, bpfloader)
14 # give netd permission to setup iptables rule with xt_bpf
15 allow netd bpfloader:bpf prog_run;
Dbpfloader.te11 # These permission is required for pin bpf program for netd.
16 allow bpfloader netd:fd use;
18 # Use pinned bpf map files from netd.
19 allow bpfloader netd:bpf { map_read map_write };
24 neverallow { domain -bpfloader -netd -netutils_wrapper} *:bpf prog_run;
25 neverallow { domain -netd -bpfloader } bpfloader_exec:file { execute execute_no_trans };
27 # only system_server, netd and bpfloader can read/write the bpf maps
28 neverallow { domain -system_server -netd -bpfloader} netd:bpf { map_read map_write };
/system/sepolicy/prebuilts/api/26.0/private/
Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)
/system/sepolicy/prebuilts/api/27.0/private/
Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)
/system/netd/
DTEST_MAPPING11 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]},
13 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]},
15 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]}

12345678