Merge "Sepolicy for netutils_wrapper to use binder call"

This commit is contained in:
Luke Huang 2019-04-25 03:09:30 +00:00 committed by Gerrit Code Review
commit 75b25384bb
2 changed files with 6 additions and 2 deletions

View file

@ -15,8 +15,10 @@ allow netutils_wrapper self:netlink_route_socket ~ioctl;
allow netutils_wrapper self:netlink_xfrm_socket ~ioctl;
# For netutils (ndc) to be able to talk to netd
allow netutils_wrapper netd_socket:sock_file { open getattr read write append };
allow netutils_wrapper netd:unix_stream_socket { read getattr connectto };
allow netutils_wrapper netd_service:service_manager find;
allow netutils_wrapper dnsresolver_service:service_manager find;
binder_use(netutils_wrapper);
binder_call(netutils_wrapper, netd);
# For vendor code that update the iptables rules at runtime. They need to reload
# the whole chain including the xt_bpf rules. They need to access to the pinned

View file

@ -138,6 +138,7 @@ neverallow {
-dumpstate
-network_stack
-netd
-netutils_wrapper
} netd_service:service_manager find;
# only system_server, dumpstate and network stack app may find dnsresolver service
@ -147,6 +148,7 @@ neverallow {
-dumpstate
-network_stack
-netd
-netutils_wrapper
} dnsresolver_service:service_manager find;
# only netd can create the bpf maps