diff --git a/public/domain.te b/public/domain.te index e27da4f7d..755b4b248 100644 --- a/public/domain.te +++ b/public/domain.te @@ -924,6 +924,9 @@ full_treble_only(` -crash_dump_exec -netutils_wrapper_exec userdebug_or_eng(`-tcpdump_exec') + # Vendor components still can invoke shell commands via /system/bin/sh + -shell_exec + -toolbox_exec }:file { entrypoint execute execute_no_trans }; ') @@ -1004,6 +1007,9 @@ full_treble_only(` -task_profiles_api_file -task_profiles_file userdebug_or_eng(`-tcpdump_exec') + # Vendor components still can invoke shell commands via /system/bin/sh + -shell_exec + -toolbox_exec }:file *; ') diff --git a/public/hal_neverallows.te b/public/hal_neverallows.te index 621a0b87a..6730c322d 100644 --- a/public/hal_neverallows.te +++ b/public/hal_neverallows.te @@ -85,7 +85,13 @@ neverallow { halserverdomain -hal_dumpstate_server -hal_telephony_server -} { file_type fs_type }:file execute_no_trans; +} { + file_type + fs_type + # May invoke shell commands via /system/bin/sh + -shell_exec + -toolbox_exec +}:file execute_no_trans; # Do not allow a process other than init to transition into a HAL domain. neverallow { domain -init } halserverdomain:process transition; # Only allow transitioning to a domain by running its executable. Do not