0ba499896a
Soft-limits apps from calling bind() on NETLINK_ROUTE sockets, and getting link info through getifaddrs(), while still allowing apps on the allowlist to temporarily perform these actions. This is different from existing behavior, where apps targeting an API level < 30 were exempted from this restriction. Actual enforcement will happen through SELinux (as is currently the case for apps targeting API >= 30). This temporary change will then be reverted. If you arrived at this change due to an app showing unexpected behavior, please file a bug at go/netlink-bug. Bug: 170188668 Bug: 170214442 Test: Call bind() on NETLINK_ROUTE for an app on the allowlist. Test: Call bind() on NETLINK_ROUTE for an app not on the allowlist. Test: Call getifaddrs() for an app on the allowlist. Test: Call getifaddrs() for an app not on the allowlist. Change-Id: I0488932deea2a7211e55a24bc33bfa3cfb16fba2 |
||
---|---|---|
.. | ||
arch-arm | ||
arch-arm64 | ||
arch-common/bionic | ||
arch-x86 | ||
arch-x86_64 | ||
async_safe | ||
bionic | ||
dns | ||
include | ||
kernel | ||
malloc_debug | ||
malloc_hooks | ||
platform | ||
private | ||
seccomp | ||
stdio | ||
system_properties | ||
tools | ||
tzcode | ||
upstream-freebsd | ||
upstream-netbsd | ||
upstream-openbsd | ||
versioner-dependencies | ||
Android.bp | ||
fs_config_generator.py | ||
libc.map.txt | ||
libstdc++.map.txt | ||
MODULE_LICENSE_BSD | ||
NOTICE | ||
SECCOMP_ALLOWLIST_APP.TXT | ||
SECCOMP_ALLOWLIST_COMMON.TXT | ||
SECCOMP_ALLOWLIST_SYSTEM.TXT | ||
SECCOMP_BLOCKLIST_APP.TXT | ||
SECCOMP_BLOCKLIST_COMMON.TXT | ||
SECCOMP_PRIORITY.TXT | ||
SYSCALLS.TXT | ||
version_script.txt |