• Stephen Smalley's avatar
    Clean up socket rules. · 16011320
    Stephen Smalley authored
    Replace * or any permission set containing create with
    create_socket_perms or create_stream_socket_perms.
    
    Add net_domain() to all domains using network sockets and
    delete rules already covered by domain.te or net.te.
    
    For netlink_route_socket, only nlmsg_write needs to be separately
    granted to specific domains that are permitted to modify the routing
    table.   Clarification:  read/write permissions are just ability to
    perform read/recv() or write/send() on the socket, whereas nlmsg_read/
    nlmsg_write permissions control ability to observe or modify the
    underlying kernel state accessed via the socket.
    See security/selinux/nlmsgtab.c in the kernel for the mapping of
    netlink message types to nlmsg_read or nlmsg_write.
    
    Delete legacy rule for b/12061011.
    
    This change does not touch any rules where only read/write were allowed
    to a socket created by another domain (inherited across exec or
    received across socket or binder IPC).  We may wish to rewrite some or all
    of those rules with the r...
    16011320
tee.te 434 Bytes