2012-04-04 16:11:16 +02:00
|
|
|
##########################
|
|
|
|
# property service keys
|
|
|
|
#
|
|
|
|
#
|
2014-06-19 16:27:02 +02:00
|
|
|
net.rmnet u:object_r:net_radio_prop:s0
|
|
|
|
net.gprs u:object_r:net_radio_prop:s0
|
|
|
|
net.ppp u:object_r:net_radio_prop:s0
|
|
|
|
net.qmi u:object_r:net_radio_prop:s0
|
|
|
|
net.lte u:object_r:net_radio_prop:s0
|
|
|
|
net.cdma u:object_r:net_radio_prop:s0
|
2017-02-10 01:08:11 +01:00
|
|
|
net.dns u:object_r:net_dns_prop:s0
|
2018-01-12 02:19:48 +01:00
|
|
|
sys.usb.config u:object_r:system_radio_prop:s0
|
2014-06-19 16:27:02 +02:00
|
|
|
ril. u:object_r:radio_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.ril. u:object_r:radio_prop:s0
|
2012-04-04 22:01:19 +02:00
|
|
|
gsm. u:object_r:radio_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
persist.radio u:object_r:radio_prop:s0
|
|
|
|
|
|
|
|
net. u:object_r:system_prop:s0
|
|
|
|
dev. u:object_r:system_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.runtime. u:object_r:system_prop:s0
|
2016-12-27 23:05:46 +01:00
|
|
|
ro.runtime.firstboot u:object_r:firstboot_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
hw. u:object_r:system_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.hw. u:object_r:system_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
sys. u:object_r:system_prop:s0
|
2016-06-23 00:47:09 +02:00
|
|
|
sys.cppreopt u:object_r:cppreopt_prop:s0
|
2019-03-14 23:45:03 +01:00
|
|
|
sys.lpdumpd u:object_r:lpdumpd_prop:s0
|
Enable SELinux on vold
This change enables SELinux security enforcement on vold.
For the vold.te file ONLY, this change is conceptually a revert of
77d4731e9d30c8971e076e2469d6957619019921 and
50e37b93ac97631dcac6961285b92af5026557af, with the following
additional changes:
1) Removal of "allow vold proc:file write;" and
"allow vold self:capability { sys_boot };". As of system/vold
change adfba3626e76c1931649634275d241b226cd1b9a, vold no longer
performs it's own reboots, so these capabilities are no longer
needed.
2) Addition of the powerctl property, which vold contacts to
tell init to reboot.
3) Removal of "allow vold kernel:system module_request;". As of
CTS commit f2cfdf5c057140d9442fcfeb4e4a648e8258b659, Android
devices no longer ship with loadable modules, hence we don't
require this rule.
4) Removal of "fsetid" from "self:capability". Any setuid / setgid
bits SHOULD be cleared if vold is able to change the permissions
of files. IMHO, it was a mistake to ever include this capability in
the first place.
Testing: As much as possible, I've tested filesystem related
functionality, including factory reset and device encryption.
I wasn't able to test fstrim functionality, which is a fairly
new feature. I didn't see any policy denials in dmesg. It's quite
possible I've missed something. If we experience problems, I
happy to roll back this change.
Bug: 9629920
Change-Id: I683afa0dffe9f28952287bfdb7ee4e0423c2e97a
2013-06-29 05:15:37 +02:00
|
|
|
sys.powerctl u:object_r:powerctl_prop:s0
|
2015-04-24 04:42:25 +02:00
|
|
|
sys.usb.ffs. u:object_r:ffs_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
service. u:object_r:system_prop:s0
|
2014-06-19 16:27:02 +02:00
|
|
|
dhcp. u:object_r:dhcp_prop:s0
|
2014-06-18 15:20:36 +02:00
|
|
|
dhcp.bt-pan.result u:object_r:pan_result_prop:s0
|
2013-05-06 19:18:27 +02:00
|
|
|
bluetooth. u:object_r:bluetooth_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
|
2013-11-01 18:45:03 +01:00
|
|
|
debug. u:object_r:debug_prop:s0
|
2014-02-06 01:36:25 +01:00
|
|
|
debug.db. u:object_r:debuggerd_prop:s0
|
2015-12-02 03:03:05 +01:00
|
|
|
dumpstate. u:object_r:dumpstate_prop:s0
|
2016-09-21 19:44:11 +02:00
|
|
|
dumpstate.options u:object_r:dumpstate_options_prop:s0
|
2018-08-08 01:03:47 +02:00
|
|
|
llk. u:object_r:llkd_prop:s0
|
|
|
|
khungtask. u:object_r:llkd_prop:s0
|
|
|
|
ro.llk. u:object_r:llkd_prop:s0
|
|
|
|
ro.khungtask. u:object_r:llkd_prop:s0
|
2016-04-15 20:10:06 +02:00
|
|
|
log. u:object_r:log_prop:s0
|
2016-06-06 21:10:00 +02:00
|
|
|
log.tag u:object_r:log_tag_prop:s0
|
2016-04-15 20:10:39 +02:00
|
|
|
log.tag.WifiHAL u:object_r:wifi_log_prop:s0
|
2016-05-31 22:01:08 +02:00
|
|
|
security.perf_harden u:object_r:shell_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
service.adb.root u:object_r:shell_prop:s0
|
|
|
|
service.adb.tcp.port u:object_r:shell_prop:s0
|
|
|
|
|
2012-11-28 02:34:54 +01:00
|
|
|
persist.audio. u:object_r:audio_prop:s0
|
2016-02-09 00:39:00 +01:00
|
|
|
persist.bluetooth. u:object_r:bluetooth_prop:s0
|
2015-06-24 08:24:17 +02:00
|
|
|
persist.debug. u:object_r:persist_debug_prop:s0
|
2014-06-12 21:47:22 +02:00
|
|
|
persist.logd. u:object_r:logd_prop:s0
|
2017-10-19 09:54:49 +02:00
|
|
|
ro.logd. u:object_r:logd_prop:s0
|
2016-01-04 16:20:45 +01:00
|
|
|
persist.logd.security u:object_r:device_logging_prop:s0
|
2016-06-06 21:18:46 +02:00
|
|
|
persist.logd.logpersistd u:object_r:logpersistd_logging_prop:s0
|
2016-07-08 17:41:08 +02:00
|
|
|
logd.logpersistd u:object_r:logpersistd_logging_prop:s0
|
2016-06-06 21:10:00 +02:00
|
|
|
persist.log.tag u:object_r:log_tag_prop:s0
|
2016-02-04 19:55:43 +01:00
|
|
|
persist.mmc. u:object_r:mmc_prop:s0
|
2017-07-11 02:43:19 +02:00
|
|
|
persist.netd.stable_secret u:object_r:netd_stable_secret_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
persist.sys. u:object_r:system_prop:s0
|
2016-02-06 00:42:32 +01:00
|
|
|
persist.sys.safemode u:object_r:safemode_prop:s0
|
2019-06-15 02:00:16 +02:00
|
|
|
persist.sys.theme u:object_r:theme_prop:s0
|
2019-04-26 10:14:52 +02:00
|
|
|
persist.sys.fflag.override.settings_dynamic_system u:object_r:dynamic_system_prop:s0
|
2016-03-03 01:14:17 +01:00
|
|
|
ro.sys.safemode u:object_r:safemode_prop:s0
|
2016-02-06 00:42:32 +01:00
|
|
|
persist.sys.audit_safemode u:object_r:safemode_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
persist.service. u:object_r:system_prop:s0
|
2013-05-06 19:18:27 +02:00
|
|
|
persist.service.bdroid. u:object_r:bluetooth_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
persist.security. u:object_r:system_prop:s0
|
2018-04-20 20:09:45 +02:00
|
|
|
persist.traced.enable u:object_r:traced_enabled_prop:s0
|
2019-03-13 19:22:23 +01:00
|
|
|
traced.lazy. u:object_r:traced_lazy_prop:s0
|
2018-12-10 17:20:20 +01:00
|
|
|
persist.heapprofd.enable u:object_r:heapprofd_enabled_prop:s0
|
2016-11-09 21:19:05 +01:00
|
|
|
persist.vendor.overlay. u:object_r:overlay_prop:s0
|
|
|
|
ro.boot.vendor.overlay. u:object_r:overlay_prop:s0
|
2016-12-14 04:50:36 +01:00
|
|
|
ro.boottime. u:object_r:boottime_prop:s0
|
2016-12-21 00:31:37 +01:00
|
|
|
ro.serialno u:object_r:serialno_prop:s0
|
2016-12-28 03:05:46 +01:00
|
|
|
ro.boot.btmacaddr u:object_r:bluetooth_prop:s0
|
2016-12-21 00:31:37 +01:00
|
|
|
ro.boot.serialno u:object_r:serialno_prop:s0
|
2016-12-28 03:05:46 +01:00
|
|
|
ro.bt. u:object_r:bluetooth_prop:s0
|
2017-08-14 23:25:10 +02:00
|
|
|
ro.boot.bootreason u:object_r:bootloader_boot_reason_prop:s0
|
|
|
|
persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0
|
|
|
|
sys.boot.reason u:object_r:system_boot_reason_prop:s0
|
2018-06-05 18:41:59 +02:00
|
|
|
sys.boot.reason.last u:object_r:last_boot_reason_prop:s0
|
2017-11-16 06:28:14 +01:00
|
|
|
pm. u:object_r:pm_prop:s0
|
2015-10-25 01:20:18 +02:00
|
|
|
test.sys.boot.reason u:object_r:test_boot_reason_prop:s0
|
2018-07-25 02:04:18 +02:00
|
|
|
sys.lmk. u:object_r:system_lmk_prop:s0
|
2019-02-01 23:52:02 +01:00
|
|
|
sys.trace. u:object_r:system_trace_prop:s0
|
2013-01-23 23:02:43 +01:00
|
|
|
|
2016-01-04 16:20:45 +01:00
|
|
|
# Boolean property set by system server upon boot indicating
|
|
|
|
# if device owner is provisioned.
|
|
|
|
ro.device_owner u:object_r:device_logging_prop:s0
|
|
|
|
|
2013-01-23 23:02:43 +01:00
|
|
|
# selinux non-persistent properties
|
2015-06-09 20:01:04 +02:00
|
|
|
selinux.restorecon_recursive u:object_r:restorecon_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
|
|
|
|
# default property context
|
|
|
|
* u:object_r:default_prop:s0
|
|
|
|
|
|
|
|
# data partition encryption properties
|
|
|
|
vold. u:object_r:vold_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.crypto. u:object_r:vold_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
|
2014-11-18 23:36:23 +01:00
|
|
|
# ro.build.fingerprint is either set in /system/build.prop, or is
|
|
|
|
# set at runtime by system_server.
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.build.fingerprint u:object_r:fingerprint_prop:s0
|
2014-11-18 23:36:23 +01:00
|
|
|
|
2017-03-01 04:21:31 +01:00
|
|
|
ro.persistent_properties.ready u:object_r:persistent_properties_ready_prop:s0
|
|
|
|
|
2012-04-04 16:11:16 +02:00
|
|
|
# ctl properties
|
2014-02-18 19:24:26 +01:00
|
|
|
ctl.bootanim u:object_r:ctl_bootanim_prop:s0
|
2018-04-05 21:13:43 +02:00
|
|
|
ctl.android.hardware.dumpstate u:object_r:ctl_dumpstate_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
ctl.dumpstate u:object_r:ctl_dumpstate_prop:s0
|
2014-02-18 19:24:26 +01:00
|
|
|
ctl.fuse_ u:object_r:ctl_fuse_prop:s0
|
|
|
|
ctl.mdnsd u:object_r:ctl_mdnsd_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
ctl.ril-daemon u:object_r:ctl_rildaemon_prop:s0
|
2014-03-06 20:47:22 +01:00
|
|
|
ctl.bugreport u:object_r:ctl_bugreport_prop:s0
|
2015-04-24 23:39:16 +02:00
|
|
|
ctl.console u:object_r:ctl_console_prop:s0
|
2012-04-04 16:11:16 +02:00
|
|
|
ctl. u:object_r:ctl_default_prop:s0
|
2014-09-26 00:13:41 +02:00
|
|
|
|
Finer grained permissions for ctl. properties
Currently, permissions for ctl. property apply to each action verb, so
if a domain has permissions for controlling service 'foo', then it can
start, stop, and restart foo.
This change implements finer grainer permissions such that permission
can be given to strictly start a given service, but not stop or
restart it. This new permission scheme is mandatory for the new
control functions, sigstop_on, sigstop_off, interface_start,
interface_stop, interface_restart.
Bug: 78511553
Test: see appropriate successes and failures based on permissions
Merged-In: Ibe0cc0d6028fb0ed7d6bcba626721e0d84cc20fa
Change-Id: Ibe0cc0d6028fb0ed7d6bcba626721e0d84cc20fa
(cherry picked from commit 2208f96e9e6264553fcc8a58b86f4f21a092468c)
2018-05-04 02:00:16 +02:00
|
|
|
# Don't allow blind access to all services
|
|
|
|
ctl.sigstop_on$ u:object_r:ctl_sigstop_prop:s0
|
|
|
|
ctl.sigstop_off$ u:object_r:ctl_sigstop_prop:s0
|
|
|
|
ctl.start$ u:object_r:ctl_start_prop:s0
|
|
|
|
ctl.stop$ u:object_r:ctl_stop_prop:s0
|
|
|
|
ctl.restart$ u:object_r:ctl_restart_prop:s0
|
|
|
|
ctl.interface_start$ u:object_r:ctl_interface_start_prop:s0
|
|
|
|
ctl.interface_stop$ u:object_r:ctl_interface_stop_prop:s0
|
|
|
|
ctl.interface_restart$ u:object_r:ctl_interface_restart_prop:s0
|
|
|
|
|
2018-06-26 21:52:21 +02:00
|
|
|
# Restrict access to starting/stopping adbd
|
|
|
|
ctl.start$adbd u:object_r:ctl_adbd_prop:s0
|
|
|
|
ctl.stop$adbd u:object_r:ctl_adbd_prop:s0
|
|
|
|
ctl.restart$adbd u:object_r:ctl_adbd_prop:s0
|
|
|
|
|
2019-02-28 03:31:11 +01:00
|
|
|
# Restrict access to starting/stopping gsid.
|
|
|
|
ctl.start$gsid u:object_r:ctl_gsid_prop:s0
|
|
|
|
ctl.stop$gsid u:object_r:ctl_gsid_prop:s0
|
|
|
|
ctl.restart$gsid u:object_r:ctl_gsid_prop:s0
|
|
|
|
|
2019-06-13 02:45:05 +02:00
|
|
|
# Restrict access to stopping apexd.
|
|
|
|
ctl.stop$apexd u:object_r:ctl_apexd_prop:s0
|
|
|
|
|
2014-09-26 00:13:41 +02:00
|
|
|
# NFC properties
|
|
|
|
nfc. u:object_r:nfc_prop:s0
|
2014-09-04 14:44:49 +02:00
|
|
|
|
|
|
|
# These properties are not normally set by processes other than init.
|
|
|
|
# They are only distinguished here for setting by qemu-props on the
|
|
|
|
# emulator/goldfish.
|
|
|
|
config. u:object_r:config_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.config. u:object_r:config_prop:s0
|
2014-09-04 14:44:49 +02:00
|
|
|
dalvik. u:object_r:dalvik_prop:s0
|
2016-01-11 22:06:25 +01:00
|
|
|
ro.dalvik. u:object_r:dalvik_prop:s0
|
2016-06-29 20:28:20 +02:00
|
|
|
|
|
|
|
# Shared between system server and wificond
|
|
|
|
wlan. u:object_r:wifi_prop:s0
|
2016-09-20 00:23:41 +02:00
|
|
|
|
2017-09-26 21:58:29 +02:00
|
|
|
# Lowpan properties
|
|
|
|
lowpan. u:object_r:lowpan_prop:s0
|
|
|
|
ro.lowpan. u:object_r:lowpan_prop:s0
|
|
|
|
|
2018-11-08 14:58:13 +01:00
|
|
|
# heapprofd properties
|
|
|
|
heapprofd. u:object_r:heapprofd_prop:s0
|
|
|
|
|
2016-09-20 00:23:41 +02:00
|
|
|
# hwservicemanager properties
|
|
|
|
hwservicemanager. u:object_r:hwservicemanager_prop:s0
|
2017-10-19 09:54:49 +02:00
|
|
|
|
2018-01-18 05:25:28 +01:00
|
|
|
# Common default properties for vendor and odm.
|
|
|
|
init.svc.odm. u:object_r:vendor_default_prop:s0
|
2017-10-19 09:54:49 +02:00
|
|
|
init.svc.vendor. u:object_r:vendor_default_prop:s0
|
|
|
|
ro.hardware. u:object_r:vendor_default_prop:s0
|
2018-01-18 05:25:28 +01:00
|
|
|
ro.odm. u:object_r:vendor_default_prop:s0
|
2017-10-19 09:54:49 +02:00
|
|
|
ro.vendor. u:object_r:vendor_default_prop:s0
|
2018-01-18 05:25:28 +01:00
|
|
|
odm. u:object_r:vendor_default_prop:s0
|
|
|
|
persist.odm. u:object_r:vendor_default_prop:s0
|
2017-10-19 09:54:49 +02:00
|
|
|
persist.vendor. u:object_r:vendor_default_prop:s0
|
|
|
|
vendor. u:object_r:vendor_default_prop:s0
|
2018-10-23 22:25:05 +02:00
|
|
|
# ro.boot. properties are set based on kernel commandline arguments, which are vendor owned.
|
|
|
|
ro.boot. u:object_r:exported2_default_prop:s0
|
2018-06-25 16:36:51 +02:00
|
|
|
|
|
|
|
# Properties that relate to time / time zone detection behavior.
|
|
|
|
persist.time. u:object_r:time_prop:s0
|
2018-10-26 05:09:55 +02:00
|
|
|
|
|
|
|
# Properties that relate to server configurable flags
|
2018-11-09 01:46:19 +01:00
|
|
|
device_config.reset_performed u:object_r:device_config_reset_performed_prop:s0
|
2019-01-17 22:30:05 +01:00
|
|
|
persist.device_config.activity_manager_native_boot. u:object_r:device_config_activity_manager_native_boot_prop:s0
|
2018-10-26 05:09:55 +02:00
|
|
|
persist.device_config.attempted_boot_count u:object_r:device_config_boot_count_prop:s0
|
2019-01-14 23:18:38 +01:00
|
|
|
persist.device_config.input_native_boot. u:object_r:device_config_input_native_boot_prop:s0
|
2018-12-27 11:01:25 +01:00
|
|
|
persist.device_config.netd_native. u:object_r:device_config_netd_native_prop:s0
|
2019-01-29 18:57:11 +01:00
|
|
|
persist.device_config.runtime_native. u:object_r:device_config_runtime_native_prop:s0
|
2019-02-01 22:43:11 +01:00
|
|
|
persist.device_config.runtime_native_boot. u:object_r:device_config_runtime_native_boot_prop:s0
|
2019-01-31 00:28:31 +01:00
|
|
|
persist.device_config.media_native. u:object_r:device_config_media_native_prop:s0
|
2018-11-08 03:24:34 +01:00
|
|
|
|
2019-04-05 17:41:30 +02:00
|
|
|
# Properties that relate to legacy server configurable flags
|
|
|
|
persist.device_config.global_settings.sys_traced u:object_r:device_config_sys_traced_prop:s0
|
|
|
|
|
2018-11-08 03:24:34 +01:00
|
|
|
apexd. u:object_r:apexd_prop:s0
|
2019-01-09 12:04:03 +01:00
|
|
|
persist.apexd. u:object_r:apexd_prop:s0
|
2019-01-11 14:32:45 +01:00
|
|
|
|
|
|
|
bpf.progs_loaded u:object_r:bpf_progs_loaded_prop:s0
|
2019-02-07 22:14:20 +01:00
|
|
|
|
|
|
|
gsid. u:object_r:gsid_prop:s0
|
|
|
|
ro.gsid. u:object_r:gsid_prop:s0
|
2019-04-02 16:34:16 +02:00
|
|
|
|
|
|
|
# Property for disabling NNAPI vendor extensions on product image (used on GSI /product image,
|
|
|
|
# which can't use NNAPI vendor extensions).
|
|
|
|
ro.nnapi.extensions.deny_on_product u:object_r:nnapi_ext_deny_product_prop:s0
|
2019-06-18 18:53:51 +02:00
|
|
|
|
|
|
|
# Property that is set once ueventd finishes cold boot.
|
|
|
|
ro.cold_boot_done u:object_r:cold_boot_done_prop:s0
|