Skip to content
Snippets Groups Projects
Commit bf65c7ef authored by Nick Kralevich's avatar Nick Kralevich
Browse files

mediaserver: remove /system/bin/toolbox exec access

In Android 5.1, mediaserver couldn't execute any file on
/system. This slightly regressed due to
8a0c25ef, which granted mediaserver
access to execute /system/bin/toolbox and /system/bin/toybox

Revoke that unneeded access and add a neverallow rule to prevent
regressions.

TODO: Remove toolbox_exec:file execute permissions from domain.te
and add it back to the specific domains that need it.

Change-Id: Ia7bc6028a9ffb723d4623d91cbe15c8c1bbb2eb9
parent 031e5ce9
No related branches found
No related tags found
No related merge requests found
...@@ -110,8 +110,8 @@ allow domain system_file:file execute; ...@@ -110,8 +110,8 @@ allow domain system_file:file execute;
allow domain system_file:lnk_file r_file_perms; allow domain system_file:lnk_file r_file_perms;
# Run toolbox. # Run toolbox.
# Kernel and init never run anything without changing domains. # Kernel, init, and mediaserver never run anything without changing domains.
allow { domain -kernel -init } toolbox_exec:file rx_file_perms; allow { domain -kernel -init -mediaserver } toolbox_exec:file rx_file_perms;
# Read files already opened under /data. # Read files already opened under /data.
allow domain system_data_file:dir { search getattr }; allow domain system_data_file:dir { search getattr };
......
...@@ -105,3 +105,11 @@ allow mediaserver drmserver:drmservice { ...@@ -105,3 +105,11 @@ allow mediaserver drmserver:drmservice {
finalizeDecryptUnit finalizeDecryptUnit
pread pread
}; };
###
### neverallow rules
###
# mediaserver should never execute any executable without a
# domain transition
neverallow mediaserver { file_type fs_type }:file execute_no_trans;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment