Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    642b8042
    relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets · 642b8042
    Nick Kralevich authored
    Netlink uevent sockets are used by the kernel to inform userspace
    when certain events occur, for example, when new hardware is added
    or removed. This allows userspace to take some action based on those
    messages.
    
    Relax the neverallow rule for NETLINK_KOBJECT_UEVENT sockets.
    Certain device specific app domains, such as system_app, may have a
    need to receive messages from this socket type.
    
    Continue to neverallow NETLINK_KOBJECT_UEVENT sockets for untrusted_app.
    These sockets have been the source of rooting attacks in Android
    in the past, and it doesn't make sense to expose this to untrusted_apps.
    
    No new SELinux rules are introduced by this change. This is an
    adjustment of compile time assertions only.
    
    Bug: 17525863
    Change-Id: I3e538dc8096dc23b9678bcd20e3c1e742c21c967
    642b8042
    History
    relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets
    Nick Kralevich authored
    Netlink uevent sockets are used by the kernel to inform userspace
    when certain events occur, for example, when new hardware is added
    or removed. This allows userspace to take some action based on those
    messages.
    
    Relax the neverallow rule for NETLINK_KOBJECT_UEVENT sockets.
    Certain device specific app domains, such as system_app, may have a
    need to receive messages from this socket type.
    
    Continue to neverallow NETLINK_KOBJECT_UEVENT sockets for untrusted_app.
    These sockets have been the source of rooting attacks in Android
    in the past, and it doesn't make sense to expose this to untrusted_apps.
    
    No new SELinux rules are introduced by this change. This is an
    adjustment of compile time assertions only.
    
    Bug: 17525863
    Change-Id: I3e538dc8096dc23b9678bcd20e3c1e742c21c967