Skip to content
Snippets Groups Projects
Select Git revision
  • oreo-r3-release
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

clatd.te

Blame
  • user avatar
    Jeff Vander Stoep authored
    This attribute is being actively removed from policy. Since
    attributes are not being versioned, partners must not be able to
    access and use this attribute. Move it from private and verify in
    the logs that rild and tee are not using these permissions.
    
    Bug: 38316109
    Test: build and boot Marlin
    Test: Verify that rild and tee are not being granted any of these
          permissions.
    Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
    76aab82c
    History
    clatd.te 1.35 KiB
    # 464xlat daemon
    type clatd, domain;
    type clatd_exec, exec_type, file_type;
    
    net_domain(clatd)
    
    r_dir_file(clatd, proc_net)
    
    # Access objects inherited from netd.
    allow clatd netd:fd use;
    allow clatd netd:fifo_file { read write };
    # TODO: Check whether some or all of these sockets should be close-on-exec.
    allow clatd netd:netlink_kobject_uevent_socket { read write };
    allow clatd netd:netlink_nflog_socket { read write };
    allow clatd netd:netlink_route_socket { read write };
    allow clatd netd:udp_socket { read write };
    allow clatd netd:unix_stream_socket { read write };
    allow clatd netd:unix_dgram_socket { read write };
    
    allow clatd self:capability { net_admin net_raw setuid setgid };
    
    # clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks
    # capable(CAP_IPC_LOCK), and then checks to see the requested amount is
    # under RLIMIT_MEMLOCK. If the latter check succeeds clatd won't have
    # needed CAP_IPC_LOCK. But this is not guaranteed to succeed on all devices
    # so we permit any requests we see from clatd asking for this capability.
    # See https://android-review.googlesource.com/127940 and
    # https://b.corp.google.com/issues/21736319
    allow clatd self:capability ipc_lock;
    
    allow clatd self:netlink_route_socket nlmsg_write;
    allow clatd self:{ packet_socket rawip_socket tun_socket } create_socket_perms_no_ioctl;
    allow clatd tun_device:chr_file rw_file_perms;