Add sepolicy for mdns service
mdns service is a subset of netd-provided services, so it gets the same treatment as netd_service or dnsresolver_service Bug: 209894875 Test: built, flashed, booted Change-Id: I33de769c4fff41e816792a34015a70f89e4b8a8c
This commit is contained in:
parent
9d34085078
commit
70b0a77ee0
11 changed files with 22 additions and 0 deletions
|
@ -33,6 +33,7 @@ allow atrace {
|
||||||
-installd_service
|
-installd_service
|
||||||
-iorapd_service
|
-iorapd_service
|
||||||
-lpdump_service
|
-lpdump_service
|
||||||
|
-mdns_service
|
||||||
-netd_service
|
-netd_service
|
||||||
-stats_service
|
-stats_service
|
||||||
-tracingproxy_service
|
-tracingproxy_service
|
||||||
|
|
|
@ -45,6 +45,7 @@
|
||||||
hal_wifi_hostapd_service
|
hal_wifi_hostapd_service
|
||||||
hal_wifi_supplicant_service
|
hal_wifi_supplicant_service
|
||||||
locale_service
|
locale_service
|
||||||
|
mdns_service
|
||||||
mtectrl
|
mtectrl
|
||||||
nearby_service
|
nearby_service
|
||||||
proc_watermark_boost_factor
|
proc_watermark_boost_factor
|
||||||
|
|
|
@ -17,6 +17,7 @@ allow netutils_wrapper self:netlink_xfrm_socket ~ioctl;
|
||||||
# For netutils (ndc) to be able to talk to netd
|
# For netutils (ndc) to be able to talk to netd
|
||||||
allow netutils_wrapper netd_service:service_manager find;
|
allow netutils_wrapper netd_service:service_manager find;
|
||||||
allow netutils_wrapper dnsresolver_service:service_manager find;
|
allow netutils_wrapper dnsresolver_service:service_manager find;
|
||||||
|
allow netutils_wrapper mdns_service:service_manager find;
|
||||||
binder_use(netutils_wrapper);
|
binder_use(netutils_wrapper);
|
||||||
binder_call(netutils_wrapper, netd);
|
binder_call(netutils_wrapper, netd);
|
||||||
|
|
||||||
|
|
|
@ -22,6 +22,7 @@ allow network_stack self:netlink_route_socket nlmsg_write;
|
||||||
|
|
||||||
allow network_stack app_api_service:service_manager find;
|
allow network_stack app_api_service:service_manager find;
|
||||||
allow network_stack dnsresolver_service:service_manager find;
|
allow network_stack dnsresolver_service:service_manager find;
|
||||||
|
allow network_stack mdns_service:service_manager find;
|
||||||
allow network_stack netd_service:service_manager find;
|
allow network_stack netd_service:service_manager find;
|
||||||
allow network_stack network_watchlist_service:service_manager find;
|
allow network_stack network_watchlist_service:service_manager find;
|
||||||
allow network_stack radio_service:service_manager find;
|
allow network_stack radio_service:service_manager find;
|
||||||
|
|
|
@ -207,6 +207,7 @@ logcat u:object_r:logcat_service:s0
|
||||||
logd u:object_r:logd_service:s0
|
logd u:object_r:logd_service:s0
|
||||||
looper_stats u:object_r:looper_stats_service:s0
|
looper_stats u:object_r:looper_stats_service:s0
|
||||||
lpdump_service u:object_r:lpdump_service:s0
|
lpdump_service u:object_r:lpdump_service:s0
|
||||||
|
mdns u:object_r:mdns_service:s0
|
||||||
media.aaudio u:object_r:audioserver_service:s0
|
media.aaudio u:object_r:audioserver_service:s0
|
||||||
media.audio_flinger u:object_r:audioserver_service:s0
|
media.audio_flinger u:object_r:audioserver_service:s0
|
||||||
media.audio_policy u:object_r:audioserver_service:s0
|
media.audio_policy u:object_r:audioserver_service:s0
|
||||||
|
|
|
@ -89,6 +89,7 @@ allow system_app {
|
||||||
-installd_service
|
-installd_service
|
||||||
-iorapd_service
|
-iorapd_service
|
||||||
-lpdump_service
|
-lpdump_service
|
||||||
|
-mdns_service
|
||||||
-netd_service
|
-netd_service
|
||||||
-system_suspend_control_internal_service
|
-system_suspend_control_internal_service
|
||||||
-system_suspend_control_service
|
-system_suspend_control_service
|
||||||
|
@ -103,6 +104,7 @@ dontaudit system_app {
|
||||||
dumpstate_service
|
dumpstate_service
|
||||||
installd_service
|
installd_service
|
||||||
iorapd_service
|
iorapd_service
|
||||||
|
mdns_service
|
||||||
netd_service
|
netd_service
|
||||||
virtual_touchpad_service
|
virtual_touchpad_service
|
||||||
vold_service
|
vold_service
|
||||||
|
|
|
@ -869,6 +869,7 @@ allow system_server iorapd_service:service_manager find;
|
||||||
allow system_server keystore_maintenance_service:service_manager find;
|
allow system_server keystore_maintenance_service:service_manager find;
|
||||||
allow system_server keystore_metrics_service:service_manager find;
|
allow system_server keystore_metrics_service:service_manager find;
|
||||||
allow system_server keystore_service:service_manager find;
|
allow system_server keystore_service:service_manager find;
|
||||||
|
allow system_server mdns_service:service_manager find;
|
||||||
allow system_server mediaserver_service:service_manager find;
|
allow system_server mediaserver_service:service_manager find;
|
||||||
allow system_server mediametrics_service:service_manager find;
|
allow system_server mediametrics_service:service_manager find;
|
||||||
allow system_server mediaextractor_service:service_manager find;
|
allow system_server mediaextractor_service:service_manager find;
|
||||||
|
|
|
@ -87,6 +87,7 @@ allow netd dnsmasq:process signal;
|
||||||
binder_use(netd)
|
binder_use(netd)
|
||||||
add_service(netd, netd_service)
|
add_service(netd, netd_service)
|
||||||
add_service(netd, dnsresolver_service)
|
add_service(netd, dnsresolver_service)
|
||||||
|
add_service(netd, mdns_service)
|
||||||
allow netd dumpstate:fifo_file { getattr write };
|
allow netd dumpstate:fifo_file { getattr write };
|
||||||
|
|
||||||
# Allow netd to call into the system server so it can check permissions.
|
# Allow netd to call into the system server so it can check permissions.
|
||||||
|
@ -150,6 +151,16 @@ neverallow {
|
||||||
-netutils_wrapper
|
-netutils_wrapper
|
||||||
} dnsresolver_service:service_manager find;
|
} dnsresolver_service:service_manager find;
|
||||||
|
|
||||||
|
# only system_server, dumpstate and network stack app may find mdns service
|
||||||
|
neverallow {
|
||||||
|
domain
|
||||||
|
-system_server
|
||||||
|
-dumpstate
|
||||||
|
-network_stack
|
||||||
|
-netd
|
||||||
|
-netutils_wrapper
|
||||||
|
} mdns_service:service_manager find;
|
||||||
|
|
||||||
# apps may not interact with netd over binder.
|
# apps may not interact with netd over binder.
|
||||||
neverallow { appdomain -network_stack } netd:binder call;
|
neverallow { appdomain -network_stack } netd:binder call;
|
||||||
neverallow netd { appdomain -network_stack userdebug_or_eng(`-su') }:binder call;
|
neverallow netd { appdomain -network_stack userdebug_or_eng(`-su') }:binder call;
|
||||||
|
|
|
@ -27,6 +27,7 @@ type keystore_metrics_service, service_manager_type;
|
||||||
type keystore_service, service_manager_type;
|
type keystore_service, service_manager_type;
|
||||||
type legacykeystore_service, service_manager_type;
|
type legacykeystore_service, service_manager_type;
|
||||||
type lpdump_service, service_manager_type;
|
type lpdump_service, service_manager_type;
|
||||||
|
type mdns_service, service_manager_type;
|
||||||
type mediaserver_service, service_manager_type;
|
type mediaserver_service, service_manager_type;
|
||||||
type mediametrics_service, service_manager_type;
|
type mediametrics_service, service_manager_type;
|
||||||
type mediaextractor_service, service_manager_type;
|
type mediaextractor_service, service_manager_type;
|
||||||
|
|
|
@ -85,6 +85,7 @@ allow shell {
|
||||||
-incident_service
|
-incident_service
|
||||||
-installd_service
|
-installd_service
|
||||||
-iorapd_service
|
-iorapd_service
|
||||||
|
-mdns_service
|
||||||
-netd_service
|
-netd_service
|
||||||
-system_suspend_control_internal_service
|
-system_suspend_control_internal_service
|
||||||
-system_suspend_control_service
|
-system_suspend_control_service
|
||||||
|
|
|
@ -12,6 +12,7 @@ allow traceur_app {
|
||||||
-installd_service
|
-installd_service
|
||||||
-iorapd_service
|
-iorapd_service
|
||||||
-lpdump_service
|
-lpdump_service
|
||||||
|
-mdns_service
|
||||||
-netd_service
|
-netd_service
|
||||||
-virtual_touchpad_service
|
-virtual_touchpad_service
|
||||||
-vold_service
|
-vold_service
|
||||||
|
|
Loading…
Reference in a new issue