Skip to content
Snippets Groups Projects
Commit 6567cc26 authored by Treehugger Robot's avatar Treehugger Robot Committed by Gerrit Code Review
Browse files

Merge "Further protect app private data files"

parents a194d375 598a75c1
No related branches found
No related tags found
No related merge requests found
...@@ -48,7 +48,6 @@ neverallow { ...@@ -48,7 +48,6 @@ neverallow {
-adbd -adbd
-appdomain -appdomain
-dexoptanalyzer -dexoptanalyzer
-init
-installd -installd
userdebug_or_eng(`-perfprofd') userdebug_or_eng(`-perfprofd')
-profman -profman
...@@ -56,12 +55,11 @@ neverallow { ...@@ -56,12 +55,11 @@ neverallow {
-system_server -system_server
} { privapp_data_file app_data_file }:dir *; } { privapp_data_file app_data_file }:dir *;
# Only apps should be modifying app data. init and installd are exempted for # Only apps should be modifying app data. installd is exempted for
# restorecon and package install/uninstall. # restorecon and package install/uninstall.
neverallow { neverallow {
domain domain
-appdomain -appdomain
-init
-installd -installd
} { privapp_data_file app_data_file }:dir ~r_dir_perms; } { privapp_data_file app_data_file }:dir ~r_dir_perms;
...@@ -80,7 +78,6 @@ neverallow { ...@@ -80,7 +78,6 @@ neverallow {
neverallow { neverallow {
domain domain
-init
-installd -installd
} { privapp_data_file app_data_file }:dir_file_class_set { relabelfrom relabelto }; } { privapp_data_file app_data_file }:dir_file_class_set { relabelfrom relabelto };
......
...@@ -223,9 +223,15 @@ allow init { ...@@ -223,9 +223,15 @@ allow init {
allow init cache_file:lnk_file r_file_perms; allow init cache_file:lnk_file r_file_perms;
allow init { file_type -system_file_type -vendor_file_type -exec_type }:dir_file_class_set relabelto; allow init {
# does init really need to relabel app data? file_type
userdebug_or_eng(`auditallow init { app_data_file privapp_data_file }:dir_file_class_set relabelto;') -system_file_type
-vendor_file_type
-exec_type
-app_data_file
-privapp_data_file
}:dir_file_class_set relabelto;
allow init { sysfs debugfs debugfs_tracing debugfs_tracing_debug }:{ dir file lnk_file } { getattr relabelfrom }; allow init { sysfs debugfs debugfs_tracing debugfs_tracing_debug }:{ dir file lnk_file } { getattr relabelfrom };
allow init { sysfs_type debugfs_type }:{ dir file lnk_file } { relabelto getattr }; allow init { sysfs_type debugfs_type }:{ dir file lnk_file } { relabelto getattr };
allow init dev_type:dir create_dir_perms; allow init dev_type:dir create_dir_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment