Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    bf626ce9
    appdomain: relax netlink_socket neverallow rule · bf626ce9
    Nick Kralevich authored
    Relax the neverallow netlink restrictions for app domains.
    In particular, some non-AOSP app domains may use netlink sockets
    to communicate with a kernel driver.
    
    Continue to neverallow generic netlink sockets for untrusted_app.
    The intention here is that only app domains which explicitly need
    this functionality should be able to request it.
    
    This change does not add or remove any SELinux rules. Rather, it
    just changes SELinux compile time assertions, as well as allowing
    this behavior in CTS.
    
    Modify other neverallow rules to use "domain" instead of "self".
    Apps shouldn't be able to handle netlink sockets, even those
    created in other SELinux domains.
    
    (cherry picked from commit d31936f8)
    
    Bug: 19198997
    Change-Id: Icfed1ee66f082df1117b090341f62981f01bc849
    bf626ce9
    History
    appdomain: relax netlink_socket neverallow rule
    Nick Kralevich authored
    Relax the neverallow netlink restrictions for app domains.
    In particular, some non-AOSP app domains may use netlink sockets
    to communicate with a kernel driver.
    
    Continue to neverallow generic netlink sockets for untrusted_app.
    The intention here is that only app domains which explicitly need
    this functionality should be able to request it.
    
    This change does not add or remove any SELinux rules. Rather, it
    just changes SELinux compile time assertions, as well as allowing
    this behavior in CTS.
    
    Modify other neverallow rules to use "domain" instead of "self".
    Apps shouldn't be able to handle netlink sockets, even those
    created in other SELinux domains.
    
    (cherry picked from commit d31936f8)
    
    Bug: 19198997
    Change-Id: Icfed1ee66f082df1117b090341f62981f01bc849