Skip to content
Snippets Groups Projects
Commit 41b62630 authored by Remi NGUYEN VAN's avatar Remi NGUYEN VAN Committed by Gerrit Code Review
Browse files

Merge "sepolicy changes for network stack app"

parents 7e06c561 5f3ba92c
No related branches found
No related tags found
No related merge requests found
......@@ -121,6 +121,7 @@
mnt_product_file
mnt_vendor_file
netd_stable_secret_prop
network_stack
network_watchlist_data_file
network_watchlist_service
overlayfs_file
......
......@@ -109,6 +109,7 @@
metadata_file
mnt_product_file
mnt_vendor_file
network_stack
network_watchlist_data_file
network_watchlist_service
overlayfs_file
......
......@@ -62,6 +62,7 @@
mediaswcodec_exec
mediaswcodec_tmpfs
mnt_product_file
network_stack
overlayfs_file
permissionmgr_service
recovery_socket
......
# Networking service app
typeattribute network_stack coredomain;
app_domain(network_stack);
net_domain(network_stack);
allow network_stack self:global_capability_class_set {
net_admin
net_bind_service
net_broadcast
net_raw
};
# Allow access to net_admin ioctl, DHCP server uses SIOCSARP
allowxperm network_stack self:udp_socket ioctl priv_sock_ioctls;
# The DhcpClient uses packet_sockets
allow network_stack self:packet_socket create_socket_perms_no_ioctl;
allow network_stack activity_service:service_manager find;
allow network_stack netd_service:service_manager find;
allow network_stack wifi_service:service_manager find;
allow network_stack connmetrics_service:service_manager find;
binder_call(network_stack, netd);
......@@ -106,6 +106,7 @@ isSystemServer=true domain=system_server_startup
user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
user=system seinfo=platform domain=system_app type=system_app_data_file
user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file
user=network_stack seinfo=platform name=com.google.android.networkstack domain=network_stack levelFrom=all
user=nfc seinfo=platform domain=nfc type=nfc_data_file
user=secure_element seinfo=platform domain=secure_element levelFrom=all
user=radio seinfo=platform domain=radio type=radio_data_file
......
......@@ -358,8 +358,8 @@ allow appdomain dropbox_data_file:file { getattr read };
###
# Superuser capabilities.
# bluetooth requires net_admin and wake_alarm.
neverallow { appdomain -bluetooth } self:capability_class_set *;
# bluetooth requires net_admin and wake_alarm. network stack app requires net_admin.
neverallow { appdomain -bluetooth -network_stack } self:capability_class_set *;
# Block device access.
neverallow appdomain dev_type:blk_file { read write };
......
......@@ -130,14 +130,20 @@ neverallow netd system_file:dir_file_class_set write;
# Write to files in /data/data or system files on /data
neverallow netd { app_data_file privapp_data_file system_data_file }:dir_file_class_set write;
# only system_server and dumpstate may find netd service
neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find;
# only system_server, dumpstate and network stack app may find netd service
neverallow {
domain
-system_server
-dumpstate
-network_stack
-netd
} netd_service:service_manager find;
# only netd can create the bpf maps
neverallow { domain -netd } netd:bpf { map_create };
# apps may not interact with netd over binder.
neverallow appdomain netd:binder call;
neverallow { appdomain -network_stack } netd:binder call;
neverallow netd { appdomain userdebug_or_eng(`-su') }:binder call;
# persist.netd.stable_secret contains RFC 7217 secret key which should never be
......
# Network stack service app
type network_stack, domain;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment