c06f0f602a
After moving IpMemoryStore service to network stack module(aosp/906907), the following untracked SELinux denials are observed on boot. W id.networkstack: type=1400 audit(0.0:63): avc: denied { write } for name="com.android.networkstack" dev="sda13" ino=704810 scontext=u:r:network_stack:s0:c49,c260,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0 Add radio_data_file type for network stack user configuration and relevant permission to allow access to its data, as the network stack is a privileged app. Test: m -j passed Change-Id: I6eab528714df6a17aae0cb546dcc3ad4bb21deea
30 lines
956 B
Text
30 lines
956 B
Text
# Networking service app
|
|
typeattribute network_stack coredomain;
|
|
|
|
app_domain(network_stack);
|
|
net_domain(network_stack);
|
|
|
|
allow network_stack self:global_capability_class_set {
|
|
net_admin
|
|
net_bind_service
|
|
net_broadcast
|
|
net_raw
|
|
};
|
|
|
|
# Allow access to net_admin ioctl, DHCP server uses SIOCSARP
|
|
allowxperm network_stack self:udp_socket ioctl priv_sock_ioctls;
|
|
|
|
# The DhcpClient uses packet_sockets
|
|
allow network_stack self:packet_socket create_socket_perms_no_ioctl;
|
|
|
|
# Monitor neighbors via netlink.
|
|
allow network_stack self:netlink_route_socket nlmsg_write;
|
|
|
|
allow network_stack app_api_service:service_manager find;
|
|
allow network_stack dnsresolver_service:service_manager find;
|
|
allow network_stack netd_service:service_manager find;
|
|
allow network_stack radio_service:service_manager find;
|
|
allow network_stack radio_data_file:dir create_dir_perms;
|
|
allow network_stack radio_data_file:file create_file_perms;
|
|
|
|
binder_call(network_stack, netd);
|