Skip to content
Snippets Groups Projects
Commit f4c76c5f authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Revert "Restore system_server ioctl socket access." am: 58305da9

am: b2245d64

Change-Id: Ib8ab9ee9051d405801857d30df0a37c43a24928e
parents ff6715f3 b2245d64
Branches
Tags
No related merge requests found
...@@ -177,7 +177,7 @@ allowxperm domain domain:{ unix_dgram_socket unix_stream_socket } ...@@ -177,7 +177,7 @@ allowxperm domain domain:{ unix_dgram_socket unix_stream_socket }
### ###
# All socket ioctls must be restricted to a whitelist. # All socket ioctls must be restricted to a whitelist.
neverallowxperm { domain -system_server } domain:socket_class_set ioctl { 0 }; neverallowxperm domain domain:socket_class_set ioctl { 0 };
# Do not allow any domain other than init or recovery to create unlabeled files. # Do not allow any domain other than init or recovery to create unlabeled files.
neverallow { domain -init -recovery } unlabeled:dir_file_class_set create; neverallow { domain -init -recovery } unlabeled:dir_file_class_set create;
......
...@@ -81,7 +81,7 @@ allow system_server self:netlink_generic_socket create_socket_perms_no_ioctl; ...@@ -81,7 +81,7 @@ allow system_server self:netlink_generic_socket create_socket_perms_no_ioctl;
# to the kernel. The ioctl permission is specifically omitted here, but may # to the kernel. The ioctl permission is specifically omitted here, but may
# be added to device specific policy along with the ioctl commands to be # be added to device specific policy along with the ioctl commands to be
# whitelisted. # whitelisted.
allow system_server self:socket create_socket_perms; allow system_server self:socket create_socket_perms_no_ioctl;
# Set and get routes directly via netlink. # Set and get routes directly via netlink.
allow system_server self:netlink_route_socket nlmsg_write; allow system_server self:netlink_route_socket nlmsg_write;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment