Skip to content
Snippets Groups Projects
Commit bfe51254 authored by Tri Vo's avatar Tri Vo
Browse files

shell: remove from system_executes_vendor_violators.

And grant explicit exemption from system_executes_vendor_violators
neverallow rules.

This does not change the policy, but is needed to test the violator
attribute for emptiness.

Bug: 72662597
Test: build sepolicy
Change-Id: Iba79bb42e1381b221fe0dc53470f62f8267a4791
parent 4e9b1c6b
No related branches found
No related tags found
No related merge requests found
...@@ -912,6 +912,7 @@ full_treble_only(` ...@@ -912,6 +912,7 @@ full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-init -init
-shell
-system_executes_vendor_violators -system_executes_vendor_violators
} { } {
vendor_file_type vendor_file_type
...@@ -922,6 +923,7 @@ full_treble_only(` ...@@ -922,6 +923,7 @@ full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell
-system_executes_vendor_violators -system_executes_vendor_violators
} vendor_file_type:file execute_no_trans; } vendor_file_type:file execute_no_trans;
') ')
......
...@@ -190,8 +190,6 @@ allow shell service_contexts_file:file r_file_perms; ...@@ -190,8 +190,6 @@ allow shell service_contexts_file:file r_file_perms;
allow shell sepolicy_file:file r_file_perms; allow shell sepolicy_file:file r_file_perms;
# Allow shell to start up vendor shell # Allow shell to start up vendor shell
# TODO(b/62041836): system processes should not run vendor executables.
typeattribute shell system_executes_vendor_violators;
allow shell vendor_shell_exec:file rx_file_perms; allow shell vendor_shell_exec:file rx_file_perms;
### ###
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment