Skip to content
Snippets Groups Projects
Commit 80cab7de authored by TreeHugger Robot's avatar TreeHugger Robot Committed by Android (Google) Code Review
Browse files

Merge "Add vendor_executes_system_violators attribute" into oc-dev

parents e506cda3 b99676ee
No related branches found
No related tags found
No related merge requests found
...@@ -141,6 +141,11 @@ attribute binder_in_vendor_violators; ...@@ -141,6 +141,11 @@ attribute binder_in_vendor_violators;
# TODO(b/36577153): Remove this once there are no violations # TODO(b/36577153): Remove this once there are no violations
attribute socket_between_core_and_vendor_violators; attribute socket_between_core_and_vendor_violators;
# All vendor domains which violate the requirement of not executing
# system processes
# TODO(b/36463595)
attribute vendor_executes_system_violators;
# All HAL servers # All HAL servers
attribute halserverdomain; attribute halserverdomain;
# All HAL clients # All HAL clients
......
...@@ -680,20 +680,18 @@ full_treble_only(` ...@@ -680,20 +680,18 @@ full_treble_only(`
# Do not allow vendor components to execute files from system # Do not allow vendor components to execute files from system
# except for the ones whitelist here. # except for the ones whitelist here.
# TODO:(b/36463595) Make this a neverallow neverallow {
userdebug_or_eng(` domain
auditallow { -coredomain
domain -appdomain
-coredomain -rild
-appdomain -vendor_executes_system_violators
-rild } {
} { exec_type
exec_type -vendor_file_type
-vendor_file_type -crash_dump_exec
-crash_dump_exec -netutils_wrapper_exec
-netutils_wrapper_exec }:file { entrypoint execute execute_no_trans };
}:file { entrypoint execute execute_no_trans };
')
') ')
# Only authorized processes should be writing to files in /data/dalvik-cache # Only authorized processes should be writing to files in /data/dalvik-cache
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment