Skip to content
Snippets Groups Projects
Commit c76a25c1 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by android-build-merger
Browse files

Fix CTS regressions

am: ed876a5e

Change-Id: Ic41e1b997968acfd68ade6e9b9901a4dd9b8d2d2
parents d41e6161 ed876a5e
No related branches found
No related tags found
No related merge requests found
...@@ -462,8 +462,8 @@ neverallow { ...@@ -462,8 +462,8 @@ neverallow {
domain domain
-adbd -adbd
-dumpstate -dumpstate
-hal_drm -hal_drm_server
-hal_cas -hal_cas_server
-init -init
-mediadrmserver -mediadrmserver
-recovery -recovery
...@@ -503,7 +503,7 @@ neverallow { domain -install_recovery -recovery } recovery_block_device:blk_file ...@@ -503,7 +503,7 @@ neverallow { domain -install_recovery -recovery } recovery_block_device:blk_file
neverallow { neverallow {
domain domain
userdebug_or_eng(`-domain') # exclude debuggable builds userdebug_or_eng(`-domain') # exclude debuggable builds
-hal_bootctl -hal_bootctl_server
-init -init
-uncrypt -uncrypt
-update_engine -update_engine
......
...@@ -23,11 +23,11 @@ allow hal_audio dumpstate:fifo_file write; ...@@ -23,11 +23,11 @@ allow hal_audio dumpstate:fifo_file write;
### ###
# Should never execute any executable without a domain transition # Should never execute any executable without a domain transition
neverallow hal_audio { file_type fs_type }:file execute_no_trans; neverallow hal_audio_server { file_type fs_type }:file execute_no_trans;
# Should never need network access. # Should never need network access.
# Disallow network sockets. # Disallow network sockets.
neverallow hal_audio domain:{ tcp_socket udp_socket rawip_socket } *; neverallow hal_audio_server domain:{ tcp_socket udp_socket rawip_socket } *;
# Only audio HAL may directly access the audio hardware # Only audio HAL may directly access the audio hardware
neverallow { halserverdomain -hal_audio_server } audio_device:chr_file *; neverallow { halserverdomain -hal_audio_server } audio_device:chr_file *;
...@@ -23,10 +23,10 @@ allow hal_camera hal_allocator_server:fd use; ...@@ -23,10 +23,10 @@ allow hal_camera hal_allocator_server:fd use;
# hal_camera should never execute any executable without a # hal_camera should never execute any executable without a
# domain transition # domain transition
neverallow hal_camera { file_type fs_type }:file execute_no_trans; neverallow hal_camera_server { file_type fs_type }:file execute_no_trans;
# hal_camera should never need network access. Disallow network sockets. # hal_camera should never need network access. Disallow network sockets.
neverallow hal_camera domain:{ tcp_socket udp_socket rawip_socket } *; neverallow hal_camera_server domain:{ tcp_socket udp_socket rawip_socket } *;
# Only camera HAL may directly access the camera hardware # Only camera HAL may directly access the camera hardware
neverallow { halserverdomain -hal_camera_server } camera_device:chr_file *; neverallow { halserverdomain -hal_camera_server } camera_device:chr_file *;
...@@ -7,7 +7,7 @@ allow hal_cas_client hal_cas_hwservice:hwservice_manager find; ...@@ -7,7 +7,7 @@ allow hal_cas_client hal_cas_hwservice:hwservice_manager find;
allow hal_cas_server hidl_memory_hwservice:hwservice_manager find; allow hal_cas_server hidl_memory_hwservice:hwservice_manager find;
# Permit reading device's serial number from system properties # Permit reading device's serial number from system properties
get_prop(hal_cas, serialno_prop) get_prop(hal_cas_server, serialno_prop)
# Read files already opened under /data # Read files already opened under /data
allow hal_cas system_data_file:file { getattr read }; allow hal_cas system_data_file:file { getattr read };
...@@ -29,7 +29,7 @@ allow hal_cas tee_device:chr_file rw_file_perms; ...@@ -29,7 +29,7 @@ allow hal_cas tee_device:chr_file rw_file_perms;
# hal_cas should never execute any executable without a # hal_cas should never execute any executable without a
# domain transition # domain transition
neverallow hal_cas { file_type fs_type }:file execute_no_trans; neverallow hal_cas_server { file_type fs_type }:file execute_no_trans;
# do not allow privileged socket ioctl commands # do not allow privileged socket ioctl commands
neverallowxperm hal_cas domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; neverallowxperm hal_cas_server domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
...@@ -47,7 +47,7 @@ allowxperm hal_drm self:{ rawip_socket tcp_socket udp_socket } ...@@ -47,7 +47,7 @@ allowxperm hal_drm self:{ rawip_socket tcp_socket udp_socket }
# hal_drm should never execute any executable without a # hal_drm should never execute any executable without a
# domain transition # domain transition
neverallow hal_drm { file_type fs_type }:file execute_no_trans; neverallow hal_drm_server { file_type fs_type }:file execute_no_trans;
# do not allow privileged socket ioctl commands # do not allow privileged socket ioctl commands
neverallowxperm hal_drm domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; neverallowxperm hal_drm_server domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls;
...@@ -213,7 +213,6 @@ expandattribute hal_$1_client true; ...@@ -213,7 +213,6 @@ expandattribute hal_$1_client true;
attribute hal_$1_server; attribute hal_$1_server;
expandattribute hal_$1_server false; expandattribute hal_$1_server false;
neverallow { hal_$1_client -halclientdomain } domain:process fork;
neverallow { hal_$1_server -halserverdomain } domain:process fork; neverallow { hal_$1_server -halserverdomain } domain:process fork;
') ')
......
...@@ -210,7 +210,7 @@ neverallow { domain -vold -init } restorecon_prop:property_service set; ...@@ -210,7 +210,7 @@ neverallow { domain -vold -init } restorecon_prop:property_service set;
neverallow { domain -system_server -vdc -vold } vold_service:service_manager find; neverallow { domain -system_server -vdc -vold } vold_service:service_manager find;
neverallow vold { neverallow vold {
domain domain
-hal_keymaster -hal_keymaster_server
-healthd -healthd
-hwservicemanager -hwservicemanager
-servicemanager -servicemanager
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment