Skip to content
Snippets Groups Projects
Commit b232842b authored by Nathan Harold's avatar Nathan Harold Committed by android-build-merger
Browse files

Allow getsockopt and setsockopt for Encap Sockets

am: ea4eaaf1

Change-Id: I1b1be4cfd4a4c35ffc3e085bebf386a7aefc4fc2
parents 51ebb601 ea4eaaf1
No related branches found
No related tags found
No related merge requests found
...@@ -3,5 +3,5 @@ ...@@ -3,5 +3,5 @@
allow appdomain zygote_tmpfs:file read; allow appdomain zygote_tmpfs:file read;
neverallow appdomain system_server:udp_socket { neverallow appdomain system_server:udp_socket {
accept append bind create getopt ioctl listen lock name_bind accept append bind create ioctl listen lock name_bind
relabelfrom relabelto setattr setopt shutdown }; relabelfrom relabelto setattr shutdown };
...@@ -43,7 +43,8 @@ unix_socket_connect(ephemeral_app, traced_producer, traced) ...@@ -43,7 +43,8 @@ unix_socket_connect(ephemeral_app, traced_producer, traced)
# allow ephemeral apps to use UDP sockets provided by the system server but not # allow ephemeral apps to use UDP sockets provided by the system server but not
# modify them other than to connect # modify them other than to connect
allow ephemeral_app system_server:udp_socket { connect getattr read recvfrom sendto write }; allow ephemeral_app system_server:udp_socket {
connect getattr read recvfrom sendto write getopt setopt };
### ###
### neverallow rules ### neverallow rules
......
...@@ -71,7 +71,8 @@ read_runtime_log_tags(platform_app) ...@@ -71,7 +71,8 @@ read_runtime_log_tags(platform_app)
# allow platform apps to use UDP sockets provided by the system server but not # allow platform apps to use UDP sockets provided by the system server but not
# modify them other than to connect # modify them other than to connect
allow platform_app system_server:udp_socket { connect getattr read recvfrom sendto write }; allow platform_app system_server:udp_socket {
connect getattr read recvfrom sendto write getopt setopt };
### ###
### Neverallow rules ### Neverallow rules
......
...@@ -150,7 +150,8 @@ dontaudit priv_app net_dns_prop:file read; ...@@ -150,7 +150,8 @@ dontaudit priv_app net_dns_prop:file read;
# allow privileged apps to use UDP sockets provided by the system server but not # allow privileged apps to use UDP sockets provided by the system server but not
# modify them other than to connect # modify them other than to connect
allow priv_app system_server:udp_socket { connect getattr read recvfrom sendto write }; allow priv_app system_server:udp_socket {
connect getattr read recvfrom sendto write getopt setopt };
### ###
### neverallow rules ### neverallow rules
......
...@@ -116,7 +116,8 @@ get_prop(system_app, device_logging_prop) ...@@ -116,7 +116,8 @@ get_prop(system_app, device_logging_prop)
# allow system apps to use UDP sockets provided by the system server but not # allow system apps to use UDP sockets provided by the system server but not
# modify them other than to connect # modify them other than to connect
allow system_app system_server:udp_socket { connect getattr read recvfrom sendto write }; allow system_app system_server:udp_socket {
connect getattr read recvfrom sendto write getopt setopt };
### ###
### Neverallow rules ### Neverallow rules
......
...@@ -123,7 +123,8 @@ unix_socket_connect(untrusted_app_all, traced_producer, traced) ...@@ -123,7 +123,8 @@ unix_socket_connect(untrusted_app_all, traced_producer, traced)
# allow untrusted apps to use UDP sockets provided by the system server but not # allow untrusted apps to use UDP sockets provided by the system server but not
# modify them other than to connect # modify them other than to connect
allow untrusted_app_all system_server:udp_socket { connect getattr read recvfrom sendto write }; allow untrusted_app_all system_server:udp_socket {
connect getattr read recvfrom sendto write getopt setopt };
# Allow the allocation and use of ptys # Allow the allocation and use of ptys
# Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment