Skip to content
Snippets Groups Projects
Commit 7c065a9f authored by William Roberts's avatar William Roberts Committed by Nick Kralevich
Browse files

neverallow "write ops" on system_data_file from "others"


Only a few system level components should be creating and writing
these files, force a type transition for shared files.

Signed-off-by: default avatarWilliam Roberts <william.c.roberts@linux.intel.com>
(cherry picked from commit 529a8634)

Change-Id: I9c4df4e332426e253dd6fcd4f8ea0348dc3a5f54
Bug: 21924438
parent b39ff99e
No related branches found
No related tags found
No related merge requests found
......@@ -424,3 +424,22 @@ neverallow { domain -init } proc:{ file dir } mounton;
# from a domain to a non-domain type and vice versa.
neverallow domain ~domain:process { transition dyntransition };
neverallow ~domain domain:process { transition dyntransition };
#
# Only system_app and system_server should be creating or writing
# their files. The proper way to share files is to setup
# type transitions to a more specific type or assigning a type
# to its parent directory via a file_contexts entry.
# Example type transition:
# mydomain.te:file_type_auto_trans(mydomain, system_data_file, new_file_type)
#
neverallow {
domain
-system_server
-system_app
-init
-installd # for relabelfrom and unlink, check for this in explicit neverallow
} system_data_file:file no_w_file_perms;
# do not grant anything greater than r_file_perms and relabelfrom unlink
# to installd
neverallow installd system_data_file:file ~{ r_file_perms relabelfrom unlink };
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment