2021-10-27 16:12:44 +02:00
|
|
|
# Bind to ports.
|
2022-02-21 18:55:59 +01:00
|
|
|
allow {netdomain -ephemeral_app -sdk_sandbox} node_type:{ icmp_socket rawip_socket tcp_socket udp_socket } node_bind;
|
|
|
|
allow {netdomain -ephemeral_app -sdk_sandbox} port_type:udp_socket name_bind;
|
|
|
|
allow {netdomain -ephemeral_app -sdk_sandbox} port_type:tcp_socket name_bind;
|
2021-10-27 16:12:44 +02:00
|
|
|
|
|
|
|
# b/141455849 gate RTM_GETLINK with a new permission nlmsg_readpriv and block access from
|
|
|
|
# untrusted_apps.
|
|
|
|
# b/171572148 gate RTM_GETNEIGH{TBL} with a new permission nlmsg_getneigh and block access from
|
|
|
|
# untrusted_apps. Some untrusted apps (e.g. untrusted_app_25-30) are granted access elsewhere
|
|
|
|
# to avoid app-compat breakage.
|
|
|
|
allow {
|
|
|
|
netdomain
|
|
|
|
-ephemeral_app
|
|
|
|
-mediaprovider
|
2022-05-17 14:22:02 +02:00
|
|
|
-priv_app
|
2022-02-21 18:55:59 +01:00
|
|
|
-sdk_sandbox
|
2021-10-27 16:12:44 +02:00
|
|
|
-untrusted_app_all
|
|
|
|
} self:netlink_route_socket { bind nlmsg_readpriv nlmsg_getneigh };
|
|
|
|
|