Skip to content
Snippets Groups Projects
Commit 64b61535 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by android-build-merger
Browse files

Useful neverallow errors am: 7636d607

am: 172d7a84

Change-Id: I4d2f74a5e4a55677fb4f0707b56336588a687571
parents d044177a 172d7a84
No related branches found
No related tags found
No related merge requests found
...@@ -619,12 +619,16 @@ full_treble_only(` ...@@ -619,12 +619,16 @@ full_treble_only(`
-appdomain -appdomain
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} binder_device:chr_file rw_file_perms; } binder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow { neverallow {
domain domain
-coredomain -coredomain
-appdomain # restrictions for vendor apps are declared lower down -appdomain # restrictions for vendor apps are declared lower down
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} service_manager_type:service_manager find; } service_manager_type:service_manager find;
')
full_treble_only(`
# Vendor apps are permited to use only stable public services. If they were to use arbitrary # Vendor apps are permited to use only stable public services. If they were to use arbitrary
# services which can change any time framework/core is updated, breakage is likely. # services which can change any time framework/core is updated, breakage is likely.
neverallow { neverallow {
...@@ -648,6 +652,8 @@ full_treble_only(` ...@@ -648,6 +652,8 @@ full_treble_only(`
-vr_hwc_service -vr_hwc_service
-vr_manager_service -vr_manager_service
}:service_manager find; }:service_manager find;
')
full_treble_only(`
neverallow { neverallow {
domain domain
-coredomain -coredomain
...@@ -664,12 +670,18 @@ full_treble_only(` ...@@ -664,12 +670,18 @@ full_treble_only(`
userdebug_or_eng(`-su') userdebug_or_eng(`-su')
-ueventd # uevent is granted create for this device, but we still neverallow I/O below -ueventd # uevent is granted create for this device, but we still neverallow I/O below
} vndbinder_device:chr_file rw_file_perms; } vndbinder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
userdebug_or_eng(`-su') userdebug_or_eng(`-su')
} vndservice_manager_type:service_manager *; } vndservice_manager_type:service_manager *;
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
...@@ -791,6 +803,8 @@ full_treble_only(` ...@@ -791,6 +803,8 @@ full_treble_only(`
data_file_type data_file_type
-core_data_file_type -core_data_file_type
}:file_class_set ~{ append getattr ioctl read write }; }:file_class_set ~{ append getattr ioctl read write };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain # TODO(b/34980020) remove exemption for appdomain -appdomain # TODO(b/34980020) remove exemption for appdomain
...@@ -885,7 +899,9 @@ full_treble_only(` ...@@ -885,7 +899,9 @@ full_treble_only(`
-postinstall_dexopt -postinstall_dexopt
-system_server -system_server
} vendor_app_file:dir { open read getattr search }; } vendor_app_file:dir { open read getattr search };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain -appdomain
...@@ -897,7 +913,9 @@ full_treble_only(` ...@@ -897,7 +913,9 @@ full_treble_only(`
-postinstall_dexopt -postinstall_dexopt
-system_server -system_server
} vendor_app_file:{ file lnk_file } r_file_perms; } vendor_app_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Limit access to /vendor/overlay # Limit access to /vendor/overlay
neverallow { neverallow {
coredomain coredomain
...@@ -909,7 +927,9 @@ full_treble_only(` ...@@ -909,7 +927,9 @@ full_treble_only(`
-webview_zygote -webview_zygote
-zygote -zygote
} vendor_overlay_file:dir { getattr open read search }; } vendor_overlay_file:dir { getattr open read search };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain -appdomain
...@@ -920,7 +940,9 @@ full_treble_only(` ...@@ -920,7 +940,9 @@ full_treble_only(`
-webview_zygote -webview_zygote
-zygote -zygote
} vendor_overlay_file:{ file lnk_file } r_file_perms; } vendor_overlay_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Non-vendor domains are not allowed to file execute shell # Non-vendor domains are not allowed to file execute shell
# from vendor # from vendor
neverallow { neverallow {
...@@ -928,7 +950,9 @@ full_treble_only(` ...@@ -928,7 +950,9 @@ full_treble_only(`
-init -init
-shell -shell
} vendor_shell_exec:file { execute execute_no_trans }; } vendor_shell_exec:file { execute execute_no_trans };
')
full_treble_only(`
# Do not allow vendor components to execute files from system # Do not allow vendor components to execute files from system
# except for the ones whitelist here. # except for the ones whitelist here.
neverallow { neverallow {
...@@ -944,7 +968,9 @@ full_treble_only(` ...@@ -944,7 +968,9 @@ full_treble_only(`
-crash_dump_exec -crash_dump_exec
-netutils_wrapper_exec -netutils_wrapper_exec
}:file { entrypoint execute execute_no_trans }; }:file { entrypoint execute execute_no_trans };
')
full_treble_only(`
# Do not allow system components to execute files from vendor # Do not allow system components to execute files from vendor
# except for the ones whitelisted here. # except for the ones whitelisted here.
neverallow { neverallow {
...@@ -958,7 +984,9 @@ full_treble_only(` ...@@ -958,7 +984,9 @@ full_treble_only(`
-vndk_sp_file -vndk_sp_file
-vendor_app_file -vendor_app_file
}:file execute; }:file execute;
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment