Update netlink_xfrm_socket for nlmsg xperm
Translate the netlink_xfrm_socket rules for the new extended permission.
This policy is updated to support kernel with or without the new nlmsg
permission.
Test: run bugreport and check that dumpstate is able to read the ipsec
policy
Bug: 353255679
Change-Id: Iede0b259057e5f9a51f051c8b78fba504d217efb
diff --git a/private/system_server.te b/private/system_server.te
index 6a498f8..1cced81 100644
--- a/private/system_server.te
+++ b/private/system_server.te
@@ -182,7 +182,11 @@
allow system_server self:netlink_route_socket nlmsg_write;
# Use XFRM (IPsec) netlink sockets
-allow system_server self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write nlmsg_read };
+allow system_server self:netlink_xfrm_socket create_socket_perms_no_ioctl;
+# For kernel < 6.13
+allow system_server self:netlink_xfrm_socket { nlmsg_read nlmsg_write };
+# For kernel >= 6.13
+allow system_server self:netlink_xfrm_socket nlmsg;
# Kill apps.
allow system_server appdomain:process { getpgid sigkill signal };