Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    87f3802a
    appdomain: relax netlink_socket neverallow rule · 87f3802a
    Nick Kralevich authored
    Relax the neverallow netlink restrictions for app domains.
    In particular, some non-AOSP app domains may use netlink sockets
    to communicate with a kernel driver.
    
    Continue to neverallow generic netlink sockets for untrusted_app.
    The intention here is that only app domains which explicitly need
    this functionality should be able to request it.
    
    This change does not add or remove any SELinux rules. Rather, it
    just changes SELinux compile time assertions, as well as allowing
    this behavior in CTS.
    
    Modify other neverallow rules to use "domain" instead of "self".
    Apps shouldn't be able to handle netlink sockets, even those
    created in other SELinux domains.
    
    (cherry picked from commit d31936f8)
    
    Change-Id: I4763cb0c9510220693c506636dbb7584712b67e2
    87f3802a
    History
    appdomain: relax netlink_socket neverallow rule
    Nick Kralevich authored
    Relax the neverallow netlink restrictions for app domains.
    In particular, some non-AOSP app domains may use netlink sockets
    to communicate with a kernel driver.
    
    Continue to neverallow generic netlink sockets for untrusted_app.
    The intention here is that only app domains which explicitly need
    this functionality should be able to request it.
    
    This change does not add or remove any SELinux rules. Rather, it
    just changes SELinux compile time assertions, as well as allowing
    this behavior in CTS.
    
    Modify other neverallow rules to use "domain" instead of "self".
    Apps shouldn't be able to handle netlink sockets, even those
    created in other SELinux domains.
    
    (cherry picked from commit d31936f8)
    
    Change-Id: I4763cb0c9510220693c506636dbb7584712b67e2