From d2315bdf6a9f08a725125bc7e0e78e48332c537b Mon Sep 17 00:00:00 2001
From: Tri Vo <trong@google.com>
Date: Fri, 12 Jan 2018 18:07:25 +0000
Subject: [PATCH] Revert "Coredomain can't execute vendor code."

This reverts commit 07dd2c9e89ec6b588a1842a3d1ef0a305e175257.

Reason for revert: albacore build broken

Change-Id: I551b1d8c008f01fb815e42b59d397feb9672b8e6
---
 public/attributes |  6 ------
 public/domain.te  | 14 --------------
 2 files changed, 20 deletions(-)

diff --git a/public/attributes b/public/attributes
index 2a8a40ada..c25f1ebc8 100644
--- a/public/attributes
+++ b/public/attributes
@@ -154,12 +154,6 @@ expandattribute vendor_executes_system_violators false;
 attribute data_between_core_and_vendor_violators;
 expandattribute data_between_core_and_vendor_violators false;
 
-# All system domains which violate the requirement of not executing vendor
-# binaries/libraries.
-# TODO(b/62041836)
-attribute system_executes_vendor_violators;
-expandattribute system_executes_vendor_violators false;
-
 # hwservices that are accessible from untrusted applications
 # WARNING: Use of this attribute should be avoided unless
 # absolutely necessary.  It is a temporary allowance to aid the
diff --git a/public/domain.te b/public/domain.te
index fb468e0db..70d8ae20f 100644
--- a/public/domain.te
+++ b/public/domain.te
@@ -829,20 +829,6 @@ full_treble_only(`
         -crash_dump_exec
         -netutils_wrapper_exec
     }:file { entrypoint execute execute_no_trans };
-
-    # Do not allow system components to execute files from vendor
-    # except for the ones whitelist here.
-    neverallow {
-      coredomain
-      -init
-      -system_executes_vendor_violators
-      -vendor_init
-    } {
-      vendor_file_type
-      -same_process_hal_file
-      -vndk_sp_file
-      -vendor_app_file
-    }:file { execute execute_no_trans };
 ')
 
 # Only authorized processes should be writing to files in /data/dalvik-cache
-- 
GitLab