Skip to content
Snippets Groups Projects
Commit a8d89c31 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep
Browse files

expand scope of priv_sock_ioctls neverallows

From self to domain

Change-Id: I97aeea67a6b66bc307715a050cf7699e5be9715e
parent ca76be74
No related branches found
No related tags found
No related merge requests found
...@@ -52,5 +52,5 @@ neverallow isolated_app cache_file:dir ~{ r_dir_perms }; ...@@ -52,5 +52,5 @@ neverallow isolated_app cache_file:dir ~{ r_dir_perms };
neverallow isolated_app cache_file:file ~{ read getattr }; neverallow isolated_app cache_file:file ~{ read getattr };
# do not allow privileged socket ioctl commands # do not allow privileged socket ioctl commands
neverallowxperm isolated_app self:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; neverallowxperm isolated_app domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
...@@ -138,4 +138,4 @@ allowxperm shell self:{ rawip_socket tcp_socket udp_socket } ioctl unpriv_sock_i ...@@ -138,4 +138,4 @@ allowxperm shell self:{ rawip_socket tcp_socket udp_socket } ioctl unpriv_sock_i
neverallow shell file_type:file link; neverallow shell file_type:file link;
# Do not allow privileged socket ioctl commands # Do not allow privileged socket ioctl commands
neverallowxperm shell self:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; neverallowxperm shell domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
...@@ -152,7 +152,7 @@ neverallow untrusted_app file_type:file link; ...@@ -152,7 +152,7 @@ neverallow untrusted_app file_type:file link;
neverallow untrusted_app sysfs_mac_address:file no_rw_file_perms; neverallow untrusted_app sysfs_mac_address:file no_rw_file_perms;
# do not allow privileged socket ioctl commands # do not allow privileged socket ioctl commands
neverallowxperm untrusted_app self:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; neverallowxperm untrusted_app domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
# Do not allow untrusted_app access to /cache # Do not allow untrusted_app access to /cache
neverallow untrusted_app { cache_file cache_recovery_file }:dir ~{ r_dir_perms }; neverallow untrusted_app { cache_file cache_recovery_file }:dir ~{ r_dir_perms };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment