summaryrefslogtreecommitdiff
path: root/libc/malloc_hooks/malloc_hooks.cpp
diff options
context:
space:
mode:
authorBram Bonné <brambonne@google.com>2020-12-03 19:03:55 +0100
committerBram Bonné <brambonne@google.com>2020-12-15 16:52:58 +0100
commit95ca52a7d69f3bdb0df1b2f4d488f83a24e56e10 (patch)
treedbb4ef3bdbd8c49a1446f3fea728b4e29b97b3ef /libc/malloc_hooks/malloc_hooks.cpp
parentac5e61fe00e0aed892abd0c5f709f9e6e3645833 (diff)
Reland: Soft-enable MAC address restrictions with allowlist.
Soft-limits apps from calling bind() on NETLINK_ROUTE sockets, and getting link info through getifaddrs(), while still allowing apps on the allowlist to temporarily perform these actions. This is different from existing behavior, where apps targeting an API level < 30 were exempted from this restriction. Actual enforcement will happen through SELinux (as is currently the case for apps targeting API >= 30). This temporary change will then be reverted. If you arrived at this change due to an app showing unexpected behavior, please file a bug at go/netlink-bug. Bug: 170188668 Bug: 170214442 Test: Call bind() on NETLINK_ROUTE for an app on the allowlist. Test: Call bind() on NETLINK_ROUTE for an app not on the allowlist. Test: Call getifaddrs() for an app on the allowlist. Test: Call getifaddrs() for an app not on the allowlist. Test: Call bind() on a AF_UNIX socket with its protocol set to NETLINK_ROUTE, confirm it can succeed. Test: Verify that previously broken apps are no longer broken. Change-Id: I8738f7912fdc816e0d30205557728ff9e84bf7e6
Diffstat (limited to 'libc/malloc_hooks/malloc_hooks.cpp')
0 files changed, 0 insertions, 0 deletions