Skip to content
Snippets Groups Projects
Commit 02863a7c authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by android-build-merger
Browse files

grant appdomain rw perms to tun_device am: 2b935cd7

am: 43412f65

* commit '43412f65':
  grant appdomain rw perms to tun_device
parents 7e3fe271 43412f65
No related branches found
No related tags found
No related merge requests found
...@@ -225,6 +225,10 @@ selinux_check_context(appdomain) ...@@ -225,6 +225,10 @@ selinux_check_context(appdomain)
auditallow { appdomain userdebug_or_eng(`-su') } sysfs:dir { open getattr read ioctl }; auditallow { appdomain userdebug_or_eng(`-su') } sysfs:dir { open getattr read ioctl };
auditallow { appdomain userdebug_or_eng(`-su') } sysfs:file r_file_perms; auditallow { appdomain userdebug_or_eng(`-su') } sysfs:file r_file_perms;
# Apps receive an open tun fd from the framework for
# device traffic. Do not allow untrusted app to directly open tun_device
allow { appdomain -isolated_app } tun_device:chr_file { read write getattr ioctl append };
### ###
### Neverallow rules ### Neverallow rules
### ###
......
...@@ -29,10 +29,6 @@ bluetooth_domain(untrusted_app) ...@@ -29,10 +29,6 @@ bluetooth_domain(untrusted_app)
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app app_data_file:file { rx_file_perms execmod }; allow untrusted_app app_data_file:file { rx_file_perms execmod };
# Third party vpn apps receive an open tun fd from the framework for
# device traffic. Do not allow untrusted app to directly open tun_device
allow untrusted_app tun_device:chr_file { read write getattr ioctl append };
# ASEC # ASEC
allow untrusted_app asec_apk_file:file r_file_perms; allow untrusted_app asec_apk_file:file r_file_perms;
# Execute libs in asec containers. # Execute libs in asec containers.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment