Skip to content
Snippets Groups Projects
Commit 7cda86eb authored by Alex Klyubin's avatar Alex Klyubin
Browse files

Permit apps to bind TCP/UDP sockets to a hostname

Change-Id: Ided2cf793e94bb58529789c3075f8480c0d0cf4e
parent 24617fc3
No related branches found
No related tags found
No related merge requests found
...@@ -32,6 +32,9 @@ allow untrusted_app asec_apk_file:file r_file_perms; ...@@ -32,6 +32,9 @@ allow untrusted_app asec_apk_file:file r_file_perms;
# Create tcp/udp sockets # Create tcp/udp sockets
allow untrusted_app node_type:{ tcp_socket udp_socket } node_bind; allow untrusted_app node_type:{ tcp_socket udp_socket } node_bind;
allow untrusted_app self:{ tcp_socket udp_socket } { create_socket_perms accept listen }; allow untrusted_app self:{ tcp_socket udp_socket } { create_socket_perms accept listen };
# Bind to a particular hostname/address/interface (e.g., localhost) instead of
# ANY. Normally, apps should not be listening on all interfaces.
allow untrusted_app port:{ tcp_socket udp_socket } name_bind;
# Allow the allocation and use of ptys # Allow the allocation and use of ptys
# Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment