Skip to content
Snippets Groups Projects
  • Nathan Harold's avatar
    ee268643
    Allow More Apps to Recv UDP Sockets from SystemServer · ee268643
    Nathan Harold authored
    This gives the privilege to system apps, platform apps,
    ephemeral apps, and privileged apps to receive a
    UDP socket from the system server. This is being added
    for supporting UDP Encapsulation sockets for IPsec, which
    must be provided by the system.
    
    This is an analogous change to a previous change that
    permitted these sockets for untrusted_apps:
    0f75a62e
    
    Bug: 70389346
    Test: IpSecManagerTest, System app verified with SL4A
    Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
    ee268643
    History
    Allow More Apps to Recv UDP Sockets from SystemServer
    Nathan Harold authored
    This gives the privilege to system apps, platform apps,
    ephemeral apps, and privileged apps to receive a
    UDP socket from the system server. This is being added
    for supporting UDP Encapsulation sockets for IPsec, which
    must be provided by the system.
    
    This is an analogous change to a previous change that
    permitted these sockets for untrusted_apps:
    0f75a62e
    
    Bug: 70389346
    Test: IpSecManagerTest, System app verified with SL4A
    Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
app.te 314 B
# TODO: deal with tmpfs_domain pub/priv split properly
# Read system properties managed by zygote.
allow appdomain zygote_tmpfs:file read;

neverallow appdomain system_server:udp_socket {
        accept append bind create getopt ioctl listen lock name_bind
        relabelfrom relabelto setattr setopt shutdown };