Skip to content
Snippets Groups Projects
Commit 0f5ad4e5 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep
Browse files

Allow AOSP processes to read pm_prop

Exclude vendor processes.

Bug: 69309298
Test: cts-tradefed run cts -m CtsCompilationTestCases
    completed in 33s. 5 passed, 0 failed
Test: runtest frameworks-services -c \
    com.android.server.pm.dex.DexoptOptionsTests \
    --install=".*FrameworksServicesTests.apk"
    OK (5 tests)

Change-Id: Ic02caf373e2214b4b931a724ca8d4f4effbc0741
parent 6faa3a1a
No related branches found
No related tags found
No related merge requests found
get_prop(coredomain, pm_prop)
......@@ -450,6 +450,10 @@ neverallow * hidl_base_hwservice:hwservice_manager find;
neverallow { domain -init } default_prop:property_service set;
neverallow { domain -init } mmc_prop:property_service set;
# Only core domains are allowed to access package_manager properties
neverallow { domain -init -system_server } pm_prop:property_service set;
neverallow { domain -coredomain } pm_prop:file no_rw_file_perms;
# Do not allow reading device's serial number from system properties except form
# a few whitelisted domains.
neverallow {
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment