Skip to content
Snippets Groups Projects
Commit 4fc64f2f authored by Jeffrey Vander Stoep's avatar Jeffrey Vander Stoep Committed by Gerrit Code Review
Browse files

Merge "netd: relax binder neverallow rules for hwservices"

parents 27c0aa7a 07c650eb
No related branches found
No related tags found
No related merge requests found
...@@ -104,10 +104,12 @@ neverallow netd system_file:dir_file_class_set write; ...@@ -104,10 +104,12 @@ neverallow netd system_file:dir_file_class_set write;
# Write to files in /data/data or system files on /data # Write to files in /data/data or system files on /data
neverallow netd { app_data_file system_data_file }:dir_file_class_set write; neverallow netd { app_data_file system_data_file }:dir_file_class_set write;
# only system_server, dumpstate and netd may interact with netd over binder # only system_server and dumpstate may find netd service
neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find; neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find;
neverallow { domain -system_server -dumpstate } netd:binder call;
neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call; # apps may not interact with netd over binder.
neverallow appdomain netd:binder call;
neverallow netd { appdomain userdebug_or_eng(`-su') }:binder call;
# persist.netd.stable_secret contains RFC 7217 secret key which should never be # persist.netd.stable_secret contains RFC 7217 secret key which should never be
# leaked to other processes. Make sure it never leaks. # leaked to other processes. Make sure it never leaks.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment