fc6556a5b5
System server forks clatd now. Need to add rules to fork clatd. netd doesn't fork clatd anymore. Bug: 212345928 Test: ping 8.8.8.8 under ipv6-only network check bpf maps are added. $ adb shell dumpsys netd --short | grep Clat -A10 ClatdController Trackers: iif[iface] nat64Prefix v6Addr -> v4Addr v4iif[v4iface] [fwmark] BPF ingress map: iif(iface) nat64Prefix v6Addr -> v4Addr oif(iface) 47(wlan0) 64:ff9b::/96 2a00:79e1:abc:6f02:b7aa:ff3c:9220:595c -> 192.0.0.4 52(v4-wlan0) BPF egress map: iif(iface) v4Addr -> v6Addr nat64Prefix oif(iface) 52(v4-wlan0) 192.0.0.4 -> 2a00:79e1:abc:6f02:b7aa:ff3c:9220:595c 64:ff9b::/96 47(wlan0) ether Change-Id: I70be6132ab7bfdd96b5f537a96722312cd93bbb8
40 lines
1.5 KiB
Text
40 lines
1.5 KiB
Text
typeattribute netd coredomain;
|
|
|
|
init_daemon_domain(netd)
|
|
|
|
# Allow netd to spawn dnsmasq in it's own domain
|
|
domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
|
|
|
|
# give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
|
|
# the map created by bpfloader
|
|
allow netd bpfloader:bpf { prog_run map_read map_write };
|
|
|
|
# in order to invoke side effect of close() on such a socket calling synchronize_rcu()
|
|
# TODO: Remove this permission when 4.9 kernel is deprecated.
|
|
allow netd self:key_socket create;
|
|
|
|
set_prop(netd, ctl_mdnsd_prop)
|
|
set_prop(netd, netd_stable_secret_prop)
|
|
|
|
get_prop(netd, adbd_config_prop)
|
|
get_prop(netd, bpf_progs_loaded_prop)
|
|
get_prop(netd, hwservicemanager_prop)
|
|
get_prop(netd, device_config_netd_native_prop)
|
|
|
|
# Allow netd to write to statsd.
|
|
unix_socket_send(netd, statsdw, statsd)
|
|
|
|
# Allow netd to send callbacks to network_stack
|
|
binder_call(netd, network_stack)
|
|
|
|
# Allow netd to send dump info to dumpstate
|
|
allow netd dumpstate:fd use;
|
|
allow netd dumpstate:fifo_file { getattr write };
|
|
|
|
# persist.netd.stable_secret contains RFC 7217 secret key which should never be
|
|
# leaked to other processes. Make sure it never leaks.
|
|
neverallow { domain -netd -init -dumpstate } netd_stable_secret_prop:file r_file_perms;
|
|
|
|
# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
|
|
# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
|
neverallow { domain -netd -init } netd_stable_secret_prop:property_service set;
|