Merge "Sepolicy for netutils_wrapper to use binder call"
This commit is contained in:
commit
75b25384bb
2 changed files with 6 additions and 2 deletions
|
@ -15,8 +15,10 @@ allow netutils_wrapper self:netlink_route_socket ~ioctl;
|
||||||
allow netutils_wrapper self:netlink_xfrm_socket ~ioctl;
|
allow netutils_wrapper self:netlink_xfrm_socket ~ioctl;
|
||||||
|
|
||||||
# For netutils (ndc) to be able to talk to netd
|
# For netutils (ndc) to be able to talk to netd
|
||||||
allow netutils_wrapper netd_socket:sock_file { open getattr read write append };
|
allow netutils_wrapper netd_service:service_manager find;
|
||||||
allow netutils_wrapper netd:unix_stream_socket { read getattr connectto };
|
allow netutils_wrapper dnsresolver_service:service_manager find;
|
||||||
|
binder_use(netutils_wrapper);
|
||||||
|
binder_call(netutils_wrapper, netd);
|
||||||
|
|
||||||
# For vendor code that update the iptables rules at runtime. They need to reload
|
# For vendor code that update the iptables rules at runtime. They need to reload
|
||||||
# the whole chain including the xt_bpf rules. They need to access to the pinned
|
# the whole chain including the xt_bpf rules. They need to access to the pinned
|
||||||
|
|
|
@ -138,6 +138,7 @@ neverallow {
|
||||||
-dumpstate
|
-dumpstate
|
||||||
-network_stack
|
-network_stack
|
||||||
-netd
|
-netd
|
||||||
|
-netutils_wrapper
|
||||||
} netd_service:service_manager find;
|
} netd_service:service_manager find;
|
||||||
|
|
||||||
# only system_server, dumpstate and network stack app may find dnsresolver service
|
# only system_server, dumpstate and network stack app may find dnsresolver service
|
||||||
|
@ -147,6 +148,7 @@ neverallow {
|
||||||
-dumpstate
|
-dumpstate
|
||||||
-network_stack
|
-network_stack
|
||||||
-netd
|
-netd
|
||||||
|
-netutils_wrapper
|
||||||
} dnsresolver_service:service_manager find;
|
} dnsresolver_service:service_manager find;
|
||||||
|
|
||||||
# only netd can create the bpf maps
|
# only netd can create the bpf maps
|
||||||
|
|
Loading…
Reference in a new issue