Skip to content
Snippets Groups Projects
  1. Feb 22, 2016
  2. Jan 08, 2016
    • Jeff Vander Stoep's avatar
      add SIOCGIFINDEX to list of unprivileged socket ioctls · c4a93a6c
      Jeff Vander Stoep authored
      Addresses
      avc: denied { ioctl } for path="socket:[69748]" dev="sockfs" ino=69748
      ioctlcmd=8933 scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:r:untrusted_app:s0:c512,c768 tclass=udp_socket
      
      Change-Id: Iee3821ade9dc044fa03705902923ed18c91425dd
      c4a93a6c
  3. Jan 05, 2016
  4. Jan 04, 2016
    • Jeff Vander Stoep's avatar
      Reduce socket ioctl perms · cbaa2b7d
      Jeff Vander Stoep authored
      Reduce the socket ioctl commands available to untrusted/isolated apps.
      Neverallow accessing sensitive information or setting of network parameters.
      Neverallow access to device private ioctls i.e. device specific
      customizations as these are a common source of driver bugs.
      
      Define common ioctl commands in ioctl_defines.
      
      Bug: 26267358
      Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
      cbaa2b7d
  5. Dec 11, 2015
    • Jeff Vander Stoep's avatar
      Migrate to upstream policy version 30 · 3a0ce49b
      Jeff Vander Stoep authored
      Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow
      priv_sock_perms to disallow access to MAC address and ESSID.
      
      Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
      3a0ce49b
  6. Dec 08, 2015
  7. Jun 05, 2015
    • Jeff Vander Stoep's avatar
      restrict app access to socket ioctls · de9b5301
      Jeff Vander Stoep authored
      Create a macro of unprivileged ioctls including
      - All common socket ioctls except MAC address
      - All wireless extensions ioctls except get/set ESSID
      - Some commonly used tty ioctls
      
      Bug: 21657002
      Change-Id: Ib08be9cb70d08c1fa2c8bddbae519e7c2df5293c
      de9b5301
Loading