Home
last modified time | relevance | path

Searched refs:netd (Results 1 – 25 of 253) sorted by relevance

1234567891011

/aosp12/system/sepolicy/prebuilts/api/28.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
44 r_dir_file(netd, proc_net)
84 binder_use(netd)
92 # Allow netd to talk to the framework service which collects netd events.
96 allow netd netdomain:{
112 hwbinder_use(netd)
[all …]
H A Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/aosp12/system/sepolicy/prebuilts/api/30.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
88 binder_use(netd)
97 # Allow netd to talk to the framework service which collects netd events.
101 allow netd netdomain:{
115 hwbinder_use(netd)
142 -netd
[all …]
H A Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/aosp12/system/sepolicy/prebuilts/api/31.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
87 binder_use(netd)
96 # Allow netd to talk to the framework service which collects netd events.
100 allow netd netdomain:{
114 hwbinder_use(netd)
139 -netd
[all …]
/aosp12/system/sepolicy/prebuilts/api/32.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
87 binder_use(netd)
96 # Allow netd to talk to the framework service which collects netd events.
100 allow netd netdomain:{
114 hwbinder_use(netd)
139 -netd
[all …]
/aosp12/system/sepolicy/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
87 binder_use(netd)
96 # Allow netd to talk to the framework service which collects netd events.
100 allow netd netdomain:{
114 hwbinder_use(netd)
139 -netd
[all …]
/aosp12/system/sepolicy/prebuilts/api/29.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
11 allow netd system_server:fd use;
19 # for netd to operate.
91 binder_use(netd)
100 # Allow netd to talk to the framework service which collects netd events.
104 allow netd netdomain:{
118 hwbinder_use(netd)
145 -netd
[all …]
H A Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/aosp12/system/sepolicy/prebuilts/api/27.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
18 # for netd to operate.
36 r_dir_file(netd, proc_net)
41 r_dir_file(netd, sysfs_type)
71 binder_use(netd)
79 # Allow netd to talk to the framework service which collects netd events.
83 allow netd netdomain:{
[all …]
H A Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/aosp12/system/sepolicy/prebuilts/api/26.0/public/
H A Dnetd.te2 type netd, domain, mlstrustedsubject;
5 net_domain(netd)
9 r_dir_file(netd, cgroup)
10 allow netd system_server:fd use;
18 # for netd to operate.
36 r_dir_file(netd, proc_net)
41 r_dir_file(netd, sysfs_type)
67 binder_use(netd)
75 # Allow netd to talk to the framework service which collects netd events.
79 allow netd netdomain:{
[all …]
H A Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
10 allow netd clatd:process signal;
18 allow netd self:key_socket create;
20 set_prop(netd, ctl_mdnsd_prop)
23 get_prop(netd, adbd_config_prop)
24 get_prop(netd, bpf_progs_loaded_prop)
25 get_prop(netd, hwservicemanager_prop)
28 # Allow netd to write to statsd.
32 binder_call(netd, network_stack)
[all …]
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
10 allow netd clatd:process signal;
18 allow netd self:key_socket create;
20 set_prop(netd, ctl_mdnsd_prop)
23 get_prop(netd, adbd_config_prop)
24 get_prop(netd, bpf_progs_loaded_prop)
25 get_prop(netd, hwservicemanager_prop)
28 # Allow netd to write to statsd.
32 binder_call(netd, network_stack)
[all …]
/aosp12/system/sepolicy/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
10 allow netd clatd:process signal;
18 allow netd self:key_socket create;
20 set_prop(netd, ctl_mdnsd_prop)
23 get_prop(netd, adbd_config_prop)
24 get_prop(netd, bpf_progs_loaded_prop)
25 get_prop(netd, hwservicemanager_prop)
28 # Allow netd to write to statsd.
32 binder_call(netd, network_stack)
[all …]
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 domain_auto_trans(netd, clatd_exec, clatd)
10 allow netd clatd:process signal;
18 allow netd self:key_socket create;
20 get_prop(netd, bpf_progs_loaded_prop)
22 # Allow netd to write to statsd.
23 unix_socket_send(netd, statsdw, statsd)
26 binder_call(netd, network_stack)
[all …]
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
17 allow netd self:key_socket create;
19 get_prop(netd, bpf_progs_loaded_prop)
21 # Allow netd to write to statsd.
22 unix_socket_send(netd, statsdw, statsd)
25 binder_call(netd, network_stack)
[all …]
/aosp12/packages/modules/NetworkStack/common/moduleutils/src/android/net/shared/
H A DNetdUtils.java42 public static void tetherStart(final INetd netd, final boolean usingLegacyDnsProxy, in tetherStart() argument
47 netd.tetherStartWithConfiguration(config); in tetherStart()
53 tetherInterface(netd, iface, dest, 20 /* maxAttempts */, 50 /* pollingIntervalMs */); in tetherInterface()
60 netd.tetherInterfaceAdd(iface); in tetherInterface()
61 networkAddInterface(netd, iface, maxAttempts, pollingIntervalMs); in tetherInterface()
64 RouteUtils.addRoutesToLocalNetwork(netd, iface, routes); in tetherInterface()
74 private static void networkAddInterface(final INetd netd, final String iface, in networkAddInterface() argument
79 netd.networkAddInterface(INetd.LOCAL_NET_ID, iface); in networkAddInterface()
94 public static void untetherInterface(final INetd netd, String iface) in untetherInterface() argument
97 netd.tetherInterfaceRemove(iface); in untetherInterface()
[all …]
/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
3 init_daemon_domain(netd)
5 # Allow netd to spawn dnsmasq in it's own domain
6 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
8 # Allow netd to start clatd in its own domain
9 domain_auto_trans(netd, clatd_exec, clatd)
11 # Allow netd to start bpfloader_exec in its own domain
12 domain_auto_trans(netd, bpfloader_exec, bpfloader)
14 # give netd permission to setup iptables rule with xt_bpf
15 allow netd bpfloader:bpf prog_run;
H A Dbpfloader.te11 # These permission is required for pin bpf program for netd.
16 allow bpfloader netd:fd use;
18 # Use pinned bpf map files from netd.
19 allow bpfloader netd:bpf { map_read map_write };
24 neverallow { domain -bpfloader -netd -netutils_wrapper} *:bpf prog_run;
25 neverallow { domain -netd -bpfloader } bpfloader_exec:file { execute execute_no_trans };
27 # only system_server, netd and bpfloader can read/write the bpf maps
28 neverallow { domain -system_server -netd -bpfloader} netd:bpf { map_read map_write };
/aosp12/system/hardware/interfaces/net/netd/1.1/vts/functional/
H A DVtsHalNetNetdV1_1TargetTest.cpp36 using android::system::net::netd::V1_1::INetd;
86 sp<INetd> netd; member in NetdHidlTest
117 netd = INetd::getService(GetParam()); in SetUp()
119 ASSERT_NE(netd, nullptr) << "Could not get HIDL instance"; in SetUp()
135 virtual void TearDown() override { netd->destroyOemNetwork(mNetHandle); } in TearDown()
140 netd->addRouteToOemNetwork(handle, iface, destination, nexthop); in expectAddRoute()
179 retStatus = netd->addInterfaceToOemNetwork(mNetHandle, sIfaceName); in TEST_P()
199 retStatus = netd->addInterfaceToOemNetwork(netHandle2, sIfaceName); in TEST_P()
207 retStatus = netd->addInterfaceToOemNetwork(netHandle2, sIfaceName); in TEST_P()
212 retStatus = netd->destroyOemNetwork(netHandle2); in TEST_P()
[all …]
/aosp12/frameworks/libs/net/client-libs/netd/com/android/net/module/util/
H A DNetdUtils.java39 public static InterfaceConfigurationParcel getInterfaceConfigParcel(@NonNull INetd netd, in getInterfaceConfigParcel() argument
42 return netd.interfaceGetCfg(iface); in getInterfaceConfigParcel()
78 public static void setInterfaceConfig(INetd netd, InterfaceConfigurationParcel configParcel) { in setInterfaceConfig() argument
80 netd.interfaceSetCfg(configParcel); in setInterfaceConfig()
89 public static void setInterfaceUp(INetd netd, String iface) { in setInterfaceUp() argument
90 final InterfaceConfigurationParcel configParcel = getInterfaceConfigParcel(netd, iface); in setInterfaceUp()
93 setInterfaceConfig(netd, configParcel); in setInterfaceUp()
99 public static void setInterfaceDown(INetd netd, String iface) { in setInterfaceDown() argument
100 final InterfaceConfigurationParcel configParcel = getInterfaceConfigParcel(netd, iface); in setInterfaceDown()
103 setInterfaceConfig(netd, configParcel); in setInterfaceDown()
/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Dnetd.te1 typeattribute netd coredomain;
2 typeattribute netd domain_deprecated;
4 init_daemon_domain(netd)
6 # Allow netd to spawn dnsmasq in it's own domain
7 domain_auto_trans(netd, dnsmasq_exec, dnsmasq)
9 # Allow netd to start clatd in its own domain
10 domain_auto_trans(netd, clatd_exec, clatd)

1234567891011