-
- Downloads
Enforce ioctl command whitelisting on all sockets
Remove the ioctl permission for most socket types. For others, such as tcp/udp/rawip/unix_dgram/unix_stream set a default unprivileged whitelist that individual domains may extend (except where neverallowed like untrusted_app). Enforce via a neverallowxperm rule. Change-Id: I15548d830f8eff1fd4d64005c5769ca2be8d4ffe
Showing
- bluetooth.te 4 additions, 2 deletionsbluetooth.te
- clatd.te 1 addition, 1 deletionclatd.te
- dhcp.te 1 addition, 1 deletiondhcp.te
- dnsmasq.te 1 addition, 0 deletionsdnsmasq.te
- domain.te 15 additions, 1 deletiondomain.te
- healthd.te 1 addition, 1 deletionhealthd.te
- hostapd.te 4 additions, 3 deletionshostapd.te
- init.te 2 additions, 0 deletionsinit.te
- ioctl_macros 1 addition, 1 deletionioctl_macros
- logd.te 1 addition, 1 deletionlogd.te
- mtp.te 1 addition, 1 deletionmtp.te
- netd.te 8 additions, 6 deletionsnetd.te
- ppp.te 1 addition, 1 deletionppp.te
- racoon.te 2 additions, 2 deletionsracoon.te
- rild.te 8 additions, 5 deletionsrild.te
- surfaceflinger.te 1 addition, 1 deletionsurfaceflinger.te
- system_server.te 12 additions, 7 deletionssystem_server.te
- tee.te 2 additions, 2 deletionstee.te
- ueventd.te 1 addition, 1 deletionueventd.te
- vold.te 1 addition, 1 deletionvold.te
Loading
Please register or sign in to comment