Skip to content
Snippets Groups Projects
Commit c996ce76 authored by Pavel Grafov's avatar Pavel Grafov Committed by android-build-merger
Browse files

Revert "Neverallow vendor code access to files on /system."

am: 10b250df

Change-Id: I1bbfc88a988bb5519cbd91fb5dd0e6d212e42b39
parents 674b1684 10b250df
No related branches found
No related tags found
No related merge requests found
...@@ -1091,10 +1091,9 @@ full_treble_only(` ...@@ -1091,10 +1091,9 @@ full_treble_only(`
-vendor_executes_system_violators -vendor_executes_system_violators
-vendor_init -vendor_init
} { } {
system_file_type exec_type
-system_file # TODO(b/111243627): remove once Treble violations are fixed.
-system_lib_file
-system_linker_exec -system_linker_exec
-vendor_file_type
-crash_dump_exec -crash_dump_exec
-netutils_wrapper_exec -netutils_wrapper_exec
userdebug_or_eng(`-tcpdump_exec') userdebug_or_eng(`-tcpdump_exec')
...@@ -1157,33 +1156,17 @@ full_treble_only(` ...@@ -1157,33 +1156,17 @@ full_treble_only(`
}:file *; }:file *;
') ')
full_treble_only(` # TODO(b/111243627): Uncomment once all violations are cleaned up.
# Do not allow vendor components access to /system files except for the #full_treble_only(`
# ones whitelisted here. # # Do not allow vendor components access to /system files except for the
neverallow { # # ones whitelisted here.
domain # neverallow {
-appdomain # domain
-coredomain # -appdomain
-vendor_executes_system_violators # -coredomain
# vendor_init needs access to init_exec for domain transition. vendor_init # -vendor_executes_system_violators
# neverallows are covered in public/vendor_init.te # } system_file_type:file *;
-vendor_init #')
} {
system_file_type
-system_file # TODO(b/111243627): remove once Treble violations are fixed.
-crash_dump_exec
-file_contexts_file
-netutils_wrapper_exec
-property_contexts_file
-system_lib_file
-system_linker_exec
-system_linker_config_file
-system_seccomp_policy_file
-system_security_cacerts_file
-system_zoneinfo_file
userdebug_or_eng(`-tcpdump_exec')
}:file *;
')
# Only authorized processes should be writing to files in /data/dalvik-cache # Only authorized processes should be writing to files in /data/dalvik-cache
neverallow { neverallow {
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment