Skip to content
Snippets Groups Projects
Commit a552b119 authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Disallow /misc access except for a few domains. am: 2c7a5f26

am: a6a3aa9d

* commit 'a6a3aa9d':
  Disallow /misc access except for a few domains.

Change-Id: I7ea35b19100ea43eedd5bad7e58170fb664ef1e2
parents b939aa60 a6a3aa9d
No related branches found
No related tags found
No related merge requests found
...@@ -321,6 +321,20 @@ neverallow { domain -recovery -update_engine } system_block_device:blk_file writ ...@@ -321,6 +321,20 @@ neverallow { domain -recovery -update_engine } system_block_device:blk_file writ
# No domains other than install_recovery or recovery can write to recovery. # No domains other than install_recovery or recovery can write to recovery.
neverallow { domain -install_recovery -recovery } recovery_block_device:blk_file write; neverallow { domain -install_recovery -recovery } recovery_block_device:blk_file write;
# No domains other than a select few can access the misc_block_device. This
# block device is reserved for OTA use.
# Do not assert this rule on userdebug/eng builds, due to some devices using
# this partition for testing purposes.
neverallow {
domain
userdebug_or_eng(`-domain') # exclude debuggable builds
-init
-uncrypt
-update_engine
-vold
-recovery
} misc_block_device:blk_file { append link relabelfrom rename write open read ioctl lock };
# Only servicemanager should be able to register with binder as the context manager # Only servicemanager should be able to register with binder as the context manager
neverallow { domain -servicemanager } *:binder set_context_mgr; neverallow { domain -servicemanager } *:binder set_context_mgr;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment