Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
ebdf8f7e
Commit
ebdf8f7e
authored
7 years ago
by
Jeff Vander Stoep
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
Useful neverallow errors am:
7636d607
am:
172d7a84
am:
64b61535
Change-Id: Ida581950c8591eb64c232ca752d16c4f8cd34c45
parents
b827155c
64b61535
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
public/domain.te
+28
-0
28 additions, 0 deletions
public/domain.te
with
28 additions
and
0 deletions
public/domain.te
+
28
−
0
View file @
ebdf8f7e
...
@@ -619,12 +619,16 @@ full_treble_only(`
...
@@ -619,12 +619,16 @@ full_treble_only(`
-appdomain
-appdomain
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} binder_device:chr_file rw_file_perms;
} binder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow {
neverallow {
domain
domain
-coredomain
-coredomain
-appdomain # restrictions for vendor apps are declared lower down
-appdomain # restrictions for vendor apps are declared lower down
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
-binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
} service_manager_type:service_manager find;
} service_manager_type:service_manager find;
')
full_treble_only(`
# Vendor apps are permited to use only stable public services. If they were to use arbitrary
# Vendor apps are permited to use only stable public services. If they were to use arbitrary
# services which can change any time framework/core is updated, breakage is likely.
# services which can change any time framework/core is updated, breakage is likely.
neverallow {
neverallow {
...
@@ -648,6 +652,8 @@ full_treble_only(`
...
@@ -648,6 +652,8 @@ full_treble_only(`
-vr_hwc_service
-vr_hwc_service
-vr_manager_service
-vr_manager_service
}:service_manager find;
}:service_manager find;
')
full_treble_only(`
neverallow {
neverallow {
domain
domain
-coredomain
-coredomain
...
@@ -664,12 +670,18 @@ full_treble_only(`
...
@@ -664,12 +670,18 @@ full_treble_only(`
userdebug_or_eng(`-su')
userdebug_or_eng(`-su')
-ueventd # uevent is granted create for this device, but we still neverallow I/O below
-ueventd # uevent is granted create for this device, but we still neverallow I/O below
} vndbinder_device:chr_file rw_file_perms;
} vndbinder_device:chr_file rw_file_perms;
')
full_treble_only(`
neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-shell
-shell
userdebug_or_eng(`-su')
userdebug_or_eng(`-su')
} vndservice_manager_type:service_manager *;
} vndservice_manager_type:service_manager *;
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-shell
-shell
...
@@ -792,6 +804,8 @@ full_treble_only(`
...
@@ -792,6 +804,8 @@ full_treble_only(`
data_file_type
data_file_type
-core_data_file_type
-core_data_file_type
}:file_class_set ~{ append getattr ioctl read write };
}:file_class_set ~{ append getattr ioctl read write };
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-appdomain # TODO(b/34980020) remove exemption for appdomain
-appdomain # TODO(b/34980020) remove exemption for appdomain
...
@@ -887,7 +901,9 @@ full_treble_only(`
...
@@ -887,7 +901,9 @@ full_treble_only(`
-postinstall_dexopt
-postinstall_dexopt
-system_server
-system_server
} vendor_app_file:dir { open read getattr search };
} vendor_app_file:dir { open read getattr search };
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-appdomain
-appdomain
...
@@ -899,7 +915,9 @@ full_treble_only(`
...
@@ -899,7 +915,9 @@ full_treble_only(`
-postinstall_dexopt
-postinstall_dexopt
-system_server
-system_server
} vendor_app_file:{ file lnk_file } r_file_perms;
} vendor_app_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Limit access to /vendor/overlay
# Limit access to /vendor/overlay
neverallow {
neverallow {
coredomain
coredomain
...
@@ -911,7 +929,9 @@ full_treble_only(`
...
@@ -911,7 +929,9 @@ full_treble_only(`
-webview_zygote
-webview_zygote
-zygote
-zygote
} vendor_overlay_file:dir { getattr open read search };
} vendor_overlay_file:dir { getattr open read search };
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-appdomain
-appdomain
...
@@ -922,7 +942,9 @@ full_treble_only(`
...
@@ -922,7 +942,9 @@ full_treble_only(`
-webview_zygote
-webview_zygote
-zygote
-zygote
} vendor_overlay_file:{ file lnk_file } r_file_perms;
} vendor_overlay_file:{ file lnk_file } r_file_perms;
')
full_treble_only(`
# Non-vendor domains are not allowed to file execute shell
# Non-vendor domains are not allowed to file execute shell
# from vendor
# from vendor
neverallow {
neverallow {
...
@@ -930,7 +952,9 @@ full_treble_only(`
...
@@ -930,7 +952,9 @@ full_treble_only(`
-init
-init
-shell
-shell
} vendor_shell_exec:file { execute execute_no_trans };
} vendor_shell_exec:file { execute execute_no_trans };
')
full_treble_only(`
# Do not allow vendor components to execute files from system
# Do not allow vendor components to execute files from system
# except for the ones whitelist here.
# except for the ones whitelist here.
neverallow {
neverallow {
...
@@ -946,7 +970,9 @@ full_treble_only(`
...
@@ -946,7 +970,9 @@ full_treble_only(`
-crash_dump_exec
-crash_dump_exec
-netutils_wrapper_exec
-netutils_wrapper_exec
}:file { entrypoint execute execute_no_trans };
}:file { entrypoint execute execute_no_trans };
')
full_treble_only(`
# Do not allow system components to execute files from vendor
# Do not allow system components to execute files from vendor
# except for the ones whitelisted here.
# except for the ones whitelisted here.
neverallow {
neverallow {
...
@@ -960,7 +986,9 @@ full_treble_only(`
...
@@ -960,7 +986,9 @@ full_treble_only(`
-vndk_sp_file
-vndk_sp_file
-vendor_app_file
-vendor_app_file
}:file execute;
}:file execute;
')
full_treble_only(`
neverallow {
neverallow {
coredomain
coredomain
-shell
-shell
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment