/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 44 r_dir_file(netd, proc_net) 84 binder_use(netd) 92 # Allow netd to talk to the framework service which collects netd events. 96 allow netd netdomain:{ 112 hwbinder_use(netd) [all …]
|
H A D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use; 18 allow dnsmasq netd:fifo_file { read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/aosp12/system/sepolicy/prebuilts/api/30.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 88 binder_use(netd) 97 # Allow netd to talk to the framework service which collects netd events. 101 allow netd netdomain:{ 115 hwbinder_use(netd) 142 -netd [all …]
|
H A D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use; 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/aosp12/system/sepolicy/prebuilts/api/31.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 87 binder_use(netd) 96 # Allow netd to talk to the framework service which collects netd events. 100 allow netd netdomain:{ 114 hwbinder_use(netd) 139 -netd [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 87 binder_use(netd) 96 # Allow netd to talk to the framework service which collects netd events. 100 allow netd netdomain:{ 114 hwbinder_use(netd) 139 -netd [all …]
|
/aosp12/system/sepolicy/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 87 binder_use(netd) 96 # Allow netd to talk to the framework service which collects netd events. 100 allow netd netdomain:{ 114 hwbinder_use(netd) 139 -netd [all …]
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 11 allow netd system_server:fd use; 19 # for netd to operate. 91 binder_use(netd) 100 # Allow netd to talk to the framework service which collects netd events. 104 allow netd netdomain:{ 118 hwbinder_use(netd) 145 -netd [all …]
|
H A D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use; 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 10 allow netd system_server:fd use; 18 # for netd to operate. 36 r_dir_file(netd, proc_net) 41 r_dir_file(netd, sysfs_type) 71 binder_use(netd) 79 # Allow netd to talk to the framework service which collects netd events. 83 allow netd netdomain:{ [all …]
|
H A D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use; 18 allow dnsmasq netd:fifo_file { read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | netd.te | 2 type netd, domain, mlstrustedsubject; 5 net_domain(netd) 9 r_dir_file(netd, cgroup) 10 allow netd system_server:fd use; 18 # for netd to operate. 36 r_dir_file(netd, proc_net) 41 r_dir_file(netd, sysfs_type) 67 binder_use(netd) 75 # Allow netd to talk to the framework service which collects netd events. 79 allow netd netdomain:{ [all …]
|
H A D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use; 18 allow dnsmasq netd:fifo_file { read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 10 allow netd clatd:process signal; 18 allow netd self:key_socket create; 20 set_prop(netd, ctl_mdnsd_prop) 23 get_prop(netd, adbd_config_prop) 24 get_prop(netd, bpf_progs_loaded_prop) 25 get_prop(netd, hwservicemanager_prop) 28 # Allow netd to write to statsd. 32 binder_call(netd, network_stack) [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 10 allow netd clatd:process signal; 18 allow netd self:key_socket create; 20 set_prop(netd, ctl_mdnsd_prop) 23 get_prop(netd, adbd_config_prop) 24 get_prop(netd, bpf_progs_loaded_prop) 25 get_prop(netd, hwservicemanager_prop) 28 # Allow netd to write to statsd. 32 binder_call(netd, network_stack) [all …]
|
/aosp12/system/sepolicy/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 10 allow netd clatd:process signal; 18 allow netd self:key_socket create; 20 set_prop(netd, ctl_mdnsd_prop) 23 get_prop(netd, adbd_config_prop) 24 get_prop(netd, bpf_progs_loaded_prop) 25 get_prop(netd, hwservicemanager_prop) 28 # Allow netd to write to statsd. 32 binder_call(netd, network_stack) [all …]
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 9 domain_auto_trans(netd, clatd_exec, clatd) 10 allow netd clatd:process signal; 18 allow netd self:key_socket create; 20 get_prop(netd, bpf_progs_loaded_prop) 22 # Allow netd to write to statsd. 23 unix_socket_send(netd, statsdw, statsd) 26 binder_call(netd, network_stack) [all …]
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 8 # Allow netd to start clatd in its own domain 9 domain_auto_trans(netd, clatd_exec, clatd) 17 allow netd self:key_socket create; 19 get_prop(netd, bpf_progs_loaded_prop) 21 # Allow netd to write to statsd. 22 unix_socket_send(netd, statsdw, statsd) 25 binder_call(netd, network_stack) [all …]
|
/aosp12/packages/modules/NetworkStack/common/moduleutils/src/android/net/shared/ |
H A D | NetdUtils.java | 42 public static void tetherStart(final INetd netd, final boolean usingLegacyDnsProxy, in tetherStart() argument 47 netd.tetherStartWithConfiguration(config); in tetherStart() 53 tetherInterface(netd, iface, dest, 20 /* maxAttempts */, 50 /* pollingIntervalMs */); in tetherInterface() 60 netd.tetherInterfaceAdd(iface); in tetherInterface() 61 networkAddInterface(netd, iface, maxAttempts, pollingIntervalMs); in tetherInterface() 64 RouteUtils.addRoutesToLocalNetwork(netd, iface, routes); in tetherInterface() 74 private static void networkAddInterface(final INetd netd, final String iface, in networkAddInterface() argument 79 netd.networkAddInterface(INetd.LOCAL_NET_ID, iface); in networkAddInterface() 94 public static void untetherInterface(final INetd netd, String iface) in untetherInterface() argument 97 netd.tetherInterfaceRemove(iface); in untetherInterface() [all …]
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 3 init_daemon_domain(netd) 5 # Allow netd to spawn dnsmasq in it's own domain 6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 8 # Allow netd to start clatd in its own domain 9 domain_auto_trans(netd, clatd_exec, clatd) 11 # Allow netd to start bpfloader_exec in its own domain 12 domain_auto_trans(netd, bpfloader_exec, bpfloader) 14 # give netd permission to setup iptables rule with xt_bpf 15 allow netd bpfloader:bpf prog_run;
|
H A D | bpfloader.te | 11 # These permission is required for pin bpf program for netd. 16 allow bpfloader netd:fd use; 18 # Use pinned bpf map files from netd. 19 allow bpfloader netd:bpf { map_read map_write }; 24 neverallow { domain -bpfloader -netd -netutils_wrapper} *:bpf prog_run; 25 neverallow { domain -netd -bpfloader } bpfloader_exec:file { execute execute_no_trans }; 27 # only system_server, netd and bpfloader can read/write the bpf maps 28 neverallow { domain -system_server -netd -bpfloader} netd:bpf { map_read map_write };
|
/aosp12/system/hardware/interfaces/net/netd/1.1/vts/functional/ |
H A D | VtsHalNetNetdV1_1TargetTest.cpp | 36 using android::system::net::netd::V1_1::INetd; 86 sp<INetd> netd; member in NetdHidlTest 117 netd = INetd::getService(GetParam()); in SetUp() 119 ASSERT_NE(netd, nullptr) << "Could not get HIDL instance"; in SetUp() 135 virtual void TearDown() override { netd->destroyOemNetwork(mNetHandle); } in TearDown() 140 netd->addRouteToOemNetwork(handle, iface, destination, nexthop); in expectAddRoute() 179 retStatus = netd->addInterfaceToOemNetwork(mNetHandle, sIfaceName); in TEST_P() 199 retStatus = netd->addInterfaceToOemNetwork(netHandle2, sIfaceName); in TEST_P() 207 retStatus = netd->addInterfaceToOemNetwork(netHandle2, sIfaceName); in TEST_P() 212 retStatus = netd->destroyOemNetwork(netHandle2); in TEST_P() [all …]
|
/aosp12/frameworks/libs/net/client-libs/netd/com/android/net/module/util/ |
H A D | NetdUtils.java | 39 public static InterfaceConfigurationParcel getInterfaceConfigParcel(@NonNull INetd netd, in getInterfaceConfigParcel() argument 42 return netd.interfaceGetCfg(iface); in getInterfaceConfigParcel() 78 public static void setInterfaceConfig(INetd netd, InterfaceConfigurationParcel configParcel) { in setInterfaceConfig() argument 80 netd.interfaceSetCfg(configParcel); in setInterfaceConfig() 89 public static void setInterfaceUp(INetd netd, String iface) { in setInterfaceUp() argument 90 final InterfaceConfigurationParcel configParcel = getInterfaceConfigParcel(netd, iface); in setInterfaceUp() 93 setInterfaceConfig(netd, configParcel); in setInterfaceUp() 99 public static void setInterfaceDown(INetd netd, String iface) { in setInterfaceDown() argument 100 final InterfaceConfigurationParcel configParcel = getInterfaceConfigParcel(netd, iface); in setInterfaceDown() 103 setInterfaceConfig(netd, configParcel); in setInterfaceDown()
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 2 typeattribute netd domain_deprecated; 4 init_daemon_domain(netd) 6 # Allow netd to spawn dnsmasq in it's own domain 7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 9 # Allow netd to start clatd in its own domain 10 domain_auto_trans(netd, clatd_exec, clatd)
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | netd.te | 1 typeattribute netd coredomain; 2 typeattribute netd domain_deprecated; 4 init_daemon_domain(netd) 6 # Allow netd to spawn dnsmasq in it's own domain 7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq) 9 # Allow netd to start clatd in its own domain 10 domain_auto_trans(netd, clatd_exec, clatd)
|