diff --git a/private/compat/26.0/26.0.cil b/private/compat/26.0/26.0.cil index 30f0d74cf10993b69fcaed9a23037cb38683b4d9..32ffc928bd462ea788bc1d10d25067d07c15cfc2 100644 --- a/private/compat/26.0/26.0.cil +++ b/private/compat/26.0/26.0.cil @@ -562,7 +562,9 @@ (typeattributeset runas_exec_26_0 (runas_exec)) (typeattributeset runtime_event_log_tags_file_26_0 (runtime_event_log_tags_file)) (typeattributeset safemode_prop_26_0 (safemode_prop)) -(typeattributeset same_process_hal_file_26_0 (same_process_hal_file)) +(typeattributeset same_process_hal_file_26_0 + ( same_process_hal_file + vendor_public_lib_file)) (typeattributeset samplingprofiler_service_26_0 (samplingprofiler_service)) (typeattributeset scheduling_policy_service_26_0 (scheduling_policy_service)) (typeattributeset sdcardd_26_0 (sdcardd)) diff --git a/private/compat/27.0/27.0.cil b/private/compat/27.0/27.0.cil index f8c86b08db73447dbf75caa1b1b1f1accd8966d2..f6b45836fb05b55069ddc6a063d5423df417c07e 100644 --- a/private/compat/27.0/27.0.cil +++ b/private/compat/27.0/27.0.cil @@ -1278,7 +1278,9 @@ (typeattributeset runas_exec_27_0 (runas_exec)) (typeattributeset runtime_event_log_tags_file_27_0 (runtime_event_log_tags_file)) (typeattributeset safemode_prop_27_0 (safemode_prop)) -(typeattributeset same_process_hal_file_27_0 (same_process_hal_file)) +(typeattributeset same_process_hal_file_27_0 + ( same_process_hal_file + vendor_public_lib_file)) (typeattributeset samplingprofiler_service_27_0 (samplingprofiler_service)) (typeattributeset scheduling_policy_service_27_0 (scheduling_policy_service)) (typeattributeset sdcardd_27_0 (sdcardd)) diff --git a/public/app.te b/public/app.te index 8e34040ad4bc2881ba772e3ac59222ef793f2cdb..52b46803855166c8bec7d76ac3256c46ff00f6e2 100644 --- a/public/app.te +++ b/public/app.te @@ -116,6 +116,10 @@ r_dir_file(appdomain, vendor_overlay_file) # for vendor provided libraries. r_dir_file(appdomain, vendor_framework_file) +# Allow apps read / execute access to vendor public libraries. +allow appdomain vendor_public_lib_file:dir r_dir_perms; +allow appdomain vendor_public_lib_file:file { execute read open getattr map }; + # Execute dex2oat when apps call dexclassloader allow appdomain dex2oat_exec:file rx_file_perms; diff --git a/public/domain.te b/public/domain.te index 2f3d8f1b4738131cc91f640f329d756fe37c3f9d..43890e4e897313229e47d177764ecfdc3284ca2f 100644 --- a/public/domain.te +++ b/public/domain.te @@ -1024,6 +1024,7 @@ full_treble_only(` -same_process_hal_file -vndk_sp_file -vendor_app_file + -vendor_public_lib_file }:file execute; ') @@ -1402,3 +1403,11 @@ neverallow { coredomain -init } mnt_vendor_file:dir *; + +# Only apps are allowed access to vendor public libraries. +full_treble_only(` + neverallow { + coredomain + -appdomain + } vendor_public_lib_file:file { execute execute_no_trans }; +') diff --git a/public/file.te b/public/file.te index e68e466012ee3e327ca88014403c688a3da68fe4..73ba5fe7e4f6d2104d8951788261e2059985987c 100644 --- a/public/file.te +++ b/public/file.te @@ -149,6 +149,9 @@ type vndk_sp_file, vendor_file_type, file_type; type vendor_framework_file, vendor_file_type, file_type; # Default type for everything in /vendor/overlay type vendor_overlay_file, vendor_file_type, file_type; +# Type for all vendor public libraries. These libs should only be exposed to +# apps. ABI stability of these libs is vendor's responsibility. +type vendor_public_lib_file, vendor_file_type, file_type; # /metadata partition itself type metadata_file, file_type;