f48d1f8e46
Revert "Updates tests for untrusted app MAC address restrictions" Revert submission 1450615-mac-address-restrictions Reason for revert: DroidMonitor: Potential culprit for Bug 173243616 - verifying through Forrest before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted Reverted Changes: I08c709b2b:Enforce RTM_GETLINK restrictions on all 3p apps I95d124ae8:Soft-enables new MAC address restrictions. I5392f8339:Updates tests for untrusted app MAC address restri... I9d214c5d0:Return anonymized MAC for apps targeting SDK < 30 Change-Id: I987dfc86dfba56a2d2a45075dc19885ca6f0a4ad
19 lines
561 B
Text
19 lines
561 B
Text
###
|
|
### Untrusted_29.
|
|
###
|
|
### This file defines the rules for untrusted apps running with
|
|
### targetSdkVersion = 29.
|
|
###
|
|
### See public/untrusted_app.te for more information about which apps are
|
|
### placed in this selinux domain.
|
|
###
|
|
|
|
typeattribute untrusted_app_29 coredomain;
|
|
|
|
app_domain(untrusted_app_29)
|
|
untrusted_app_domain(untrusted_app_29)
|
|
net_domain(untrusted_app_29)
|
|
bluetooth_domain(untrusted_app_29)
|
|
|
|
# allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
|
allow untrusted_app_29 self:netlink_route_socket { bind nlmsg_readpriv };
|