Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
a8d89c31
Commit
a8d89c31
authored
9 years ago
by
Jeff Vander Stoep
Browse files
Options
Downloads
Patches
Plain Diff
expand scope of priv_sock_ioctls neverallows
From self to domain Change-Id: I97aeea67a6b66bc307715a050cf7699e5be9715e
parent
ca76be74
No related branches found
No related tags found
No related merge requests found
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
isolated_app.te
+1
-1
1 addition, 1 deletion
isolated_app.te
shell.te
+1
-1
1 addition, 1 deletion
shell.te
untrusted_app.te
+1
-1
1 addition, 1 deletion
untrusted_app.te
with
3 additions
and
3 deletions
isolated_app.te
+
1
−
1
View file @
a8d89c31
...
@@ -52,5 +52,5 @@ neverallow isolated_app cache_file:dir ~{ r_dir_perms };
...
@@ -52,5 +52,5 @@ neverallow isolated_app cache_file:dir ~{ r_dir_perms };
neverallow isolated_app cache_file:file ~{ read getattr };
neverallow isolated_app cache_file:file ~{ read getattr };
# do not allow privileged socket ioctl commands
# do not allow privileged socket ioctl commands
neverallowxperm isolated_app
self
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
neverallowxperm isolated_app
domain
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
This diff is collapsed.
Click to expand it.
shell.te
+
1
−
1
View file @
a8d89c31
...
@@ -138,4 +138,4 @@ allowxperm shell self:{ rawip_socket tcp_socket udp_socket } ioctl unpriv_sock_i
...
@@ -138,4 +138,4 @@ allowxperm shell self:{ rawip_socket tcp_socket udp_socket } ioctl unpriv_sock_i
neverallow shell file_type:file link;
neverallow shell file_type:file link;
# Do not allow privileged socket ioctl commands
# Do not allow privileged socket ioctl commands
neverallowxperm shell
self
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
neverallowxperm shell
domain
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
This diff is collapsed.
Click to expand it.
untrusted_app.te
+
1
−
1
View file @
a8d89c31
...
@@ -152,7 +152,7 @@ neverallow untrusted_app file_type:file link;
...
@@ -152,7 +152,7 @@ neverallow untrusted_app file_type:file link;
neverallow untrusted_app sysfs_mac_address:file no_rw_file_perms;
neverallow untrusted_app sysfs_mac_address:file no_rw_file_perms;
# do not allow privileged socket ioctl commands
# do not allow privileged socket ioctl commands
neverallowxperm untrusted_app
self
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
neverallowxperm untrusted_app
domain
:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
# Do not allow untrusted_app access to /cache
# Do not allow untrusted_app access to /cache
neverallow untrusted_app { cache_file cache_recovery_file }:dir ~{ r_dir_perms };
neverallow untrusted_app { cache_file cache_recovery_file }:dir ~{ r_dir_perms };
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment