Skip to content
Snippets Groups Projects
Commit ebdf8f7e authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by android-build-merger
Browse files

Useful neverallow errors am: 7636d607 am: 172d7a84

am: 64b61535

Change-Id: Ida581950c8591eb64c232ca752d16c4f8cd34c45
parents b827155c 64b61535
Branches
Tags
No related merge requests found
...@@ -619,12 +619,16 @@ full_treble_only(` ...@@ -619,12 +619,16 @@ full_treble_only(`
-appdomain -appdomain
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} binder_device:chr_file rw_file_perms; } binder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow { neverallow {
domain domain
-coredomain -coredomain
-appdomain # restrictions for vendor apps are declared lower down -appdomain # restrictions for vendor apps are declared lower down
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} service_manager_type:service_manager find; } service_manager_type:service_manager find;
')
full_treble_only(`
# Vendor apps are permited to use only stable public services. If they were to use arbitrary # Vendor apps are permited to use only stable public services. If they were to use arbitrary
# services which can change any time framework/core is updated, breakage is likely. # services which can change any time framework/core is updated, breakage is likely.
neverallow { neverallow {
...@@ -648,6 +652,8 @@ full_treble_only(` ...@@ -648,6 +652,8 @@ full_treble_only(`
-vr_hwc_service -vr_hwc_service
-vr_manager_service -vr_manager_service
}:service_manager find; }:service_manager find;
')
full_treble_only(`
neverallow { neverallow {
domain domain
-coredomain -coredomain
...@@ -664,12 +670,18 @@ full_treble_only(` ...@@ -664,12 +670,18 @@ full_treble_only(`
userdebug_or_eng(`-su') userdebug_or_eng(`-su')
-ueventd # uevent is granted create for this device, but we still neverallow I/O below -ueventd # uevent is granted create for this device, but we still neverallow I/O below
} vndbinder_device:chr_file rw_file_perms; } vndbinder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
userdebug_or_eng(`-su') userdebug_or_eng(`-su')
} vndservice_manager_type:service_manager *; } vndservice_manager_type:service_manager *;
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
...@@ -792,6 +804,8 @@ full_treble_only(` ...@@ -792,6 +804,8 @@ full_treble_only(`
data_file_type data_file_type
-core_data_file_type -core_data_file_type
}:file_class_set ~{ append getattr ioctl read write }; }:file_class_set ~{ append getattr ioctl read write };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain # TODO(b/34980020) remove exemption for appdomain -appdomain # TODO(b/34980020) remove exemption for appdomain
...@@ -887,7 +901,9 @@ full_treble_only(` ...@@ -887,7 +901,9 @@ full_treble_only(`
-postinstall_dexopt -postinstall_dexopt
-system_server -system_server
} vendor_app_file:dir { open read getattr search }; } vendor_app_file:dir { open read getattr search };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain -appdomain
...@@ -899,7 +915,9 @@ full_treble_only(` ...@@ -899,7 +915,9 @@ full_treble_only(`
-postinstall_dexopt -postinstall_dexopt
-system_server -system_server
} vendor_app_file:{ file lnk_file } r_file_perms; } vendor_app_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Limit access to /vendor/overlay # Limit access to /vendor/overlay
neverallow { neverallow {
coredomain coredomain
...@@ -911,7 +929,9 @@ full_treble_only(` ...@@ -911,7 +929,9 @@ full_treble_only(`
-webview_zygote -webview_zygote
-zygote -zygote
} vendor_overlay_file:dir { getattr open read search }; } vendor_overlay_file:dir { getattr open read search };
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-appdomain -appdomain
...@@ -922,7 +942,9 @@ full_treble_only(` ...@@ -922,7 +942,9 @@ full_treble_only(`
-webview_zygote -webview_zygote
-zygote -zygote
} vendor_overlay_file:{ file lnk_file } r_file_perms; } vendor_overlay_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Non-vendor domains are not allowed to file execute shell # Non-vendor domains are not allowed to file execute shell
# from vendor # from vendor
neverallow { neverallow {
...@@ -930,7 +952,9 @@ full_treble_only(` ...@@ -930,7 +952,9 @@ full_treble_only(`
-init -init
-shell -shell
} vendor_shell_exec:file { execute execute_no_trans }; } vendor_shell_exec:file { execute execute_no_trans };
')
full_treble_only(`
# Do not allow vendor components to execute files from system # Do not allow vendor components to execute files from system
# except for the ones whitelist here. # except for the ones whitelist here.
neverallow { neverallow {
...@@ -946,7 +970,9 @@ full_treble_only(` ...@@ -946,7 +970,9 @@ full_treble_only(`
-crash_dump_exec -crash_dump_exec
-netutils_wrapper_exec -netutils_wrapper_exec
}:file { entrypoint execute execute_no_trans }; }:file { entrypoint execute execute_no_trans };
')
full_treble_only(`
# Do not allow system components to execute files from vendor # Do not allow system components to execute files from vendor
# except for the ones whitelisted here. # except for the ones whitelisted here.
neverallow { neverallow {
...@@ -960,7 +986,9 @@ full_treble_only(` ...@@ -960,7 +986,9 @@ full_treble_only(`
-vndk_sp_file -vndk_sp_file
-vendor_app_file -vendor_app_file
}:file execute; }:file execute;
')
full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-shell -shell
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment