Skip to content
Snippets Groups Projects
Commit ae5c3c1b authored by Nick Kralevich's avatar Nick Kralevich Committed by Android Git Automerger
Browse files

am d31936f8: appdomain: relax netlink_socket neverallow rule

* commit 'd31936f8':
  appdomain: relax netlink_socket neverallow rule
parents 54477ed7 d31936f8
No related branches found
No related tags found
No related merge requests found
...@@ -222,8 +222,7 @@ neverallow appdomain tee_device:chr_file { read write }; ...@@ -222,8 +222,7 @@ neverallow appdomain tee_device:chr_file { read write };
# Privileged netlink socket interfaces. # Privileged netlink socket interfaces.
neverallow appdomain neverallow appdomain
self:{ domain:{
netlink_socket
netlink_firewall_socket netlink_firewall_socket
netlink_tcpdiag_socket netlink_tcpdiag_socket
netlink_nflog_socket netlink_nflog_socket
...@@ -236,7 +235,7 @@ neverallow appdomain ...@@ -236,7 +235,7 @@ neverallow appdomain
# These messages are broadcast messages from the kernel to userspace. # These messages are broadcast messages from the kernel to userspace.
# Do not allow the writing of netlink messages, which has been a source # Do not allow the writing of netlink messages, which has been a source
# of rooting vulns in the past. # of rooting vulns in the past.
neverallow appdomain self:netlink_kobject_uevent_socket { write append }; neverallow appdomain domain:netlink_kobject_uevent_socket { write append };
# Sockets under /dev/socket that are not specifically typed. # Sockets under /dev/socket that are not specifically typed.
neverallow appdomain socket_device:sock_file write; neverallow appdomain socket_device:sock_file write;
......
...@@ -116,7 +116,10 @@ auditallow untrusted_app { ...@@ -116,7 +116,10 @@ auditallow untrusted_app {
### ###
# Receive or send uevent messages. # Receive or send uevent messages.
neverallow untrusted_app self:netlink_kobject_uevent_socket *; neverallow untrusted_app domain:netlink_kobject_uevent_socket *;
# Receive or send generic netlink messages
neverallow untrusted_app domain:netlink_socket *;
# Too much leaky information in debugfs. It's a security # Too much leaky information in debugfs. It's a security
# best practice to ensure these files aren't readable. # best practice to ensure these files aren't readable.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment