Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
ae5c3c1b
Commit
ae5c3c1b
authored
10 years ago
by
Nick Kralevich
Committed by
Android Git Automerger
10 years ago
Browse files
Options
Downloads
Plain Diff
am
d31936f8
: appdomain: relax netlink_socket neverallow rule
* commit '
d31936f8
': appdomain: relax netlink_socket neverallow rule
parents
54477ed7
d31936f8
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
app.te
+2
-3
2 additions, 3 deletions
app.te
untrusted_app.te
+4
-1
4 additions, 1 deletion
untrusted_app.te
with
6 additions
and
4 deletions
app.te
+
2
−
3
View file @
ae5c3c1b
...
@@ -222,8 +222,7 @@ neverallow appdomain tee_device:chr_file { read write };
...
@@ -222,8 +222,7 @@ neverallow appdomain tee_device:chr_file { read write };
# Privileged netlink socket interfaces.
# Privileged netlink socket interfaces.
neverallow appdomain
neverallow appdomain
self:{
domain:{
netlink_socket
netlink_firewall_socket
netlink_firewall_socket
netlink_tcpdiag_socket
netlink_tcpdiag_socket
netlink_nflog_socket
netlink_nflog_socket
...
@@ -236,7 +235,7 @@ neverallow appdomain
...
@@ -236,7 +235,7 @@ neverallow appdomain
# These messages are broadcast messages from the kernel to userspace.
# These messages are broadcast messages from the kernel to userspace.
# Do not allow the writing of netlink messages, which has been a source
# Do not allow the writing of netlink messages, which has been a source
# of rooting vulns in the past.
# of rooting vulns in the past.
neverallow appdomain
self
:netlink_kobject_uevent_socket { write append };
neverallow appdomain
domain
:netlink_kobject_uevent_socket { write append };
# Sockets under /dev/socket that are not specifically typed.
# Sockets under /dev/socket that are not specifically typed.
neverallow appdomain socket_device:sock_file write;
neverallow appdomain socket_device:sock_file write;
...
...
This diff is collapsed.
Click to expand it.
untrusted_app.te
+
4
−
1
View file @
ae5c3c1b
...
@@ -116,7 +116,10 @@ auditallow untrusted_app {
...
@@ -116,7 +116,10 @@ auditallow untrusted_app {
###
###
# Receive or send uevent messages.
# Receive or send uevent messages.
neverallow untrusted_app self:netlink_kobject_uevent_socket *;
neverallow untrusted_app domain:netlink_kobject_uevent_socket *;
# Receive or send generic netlink messages
neverallow untrusted_app domain:netlink_socket *;
# Too much leaky information in debugfs. It's a security
# Too much leaky information in debugfs. It's a security
# best practice to ensure these files aren't readable.
# best practice to ensure these files aren't readable.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment