Make sure neverallow rules also cover other property types
There are now individual property files to control access to properties. Don't allow processes other than init to write to these property files. Change-Id: I184b9df4555ae5051f9a2ba946613c6c5d9d4403
This commit is contained in:
parent
6b65143f79
commit
45737b9f58
1 changed files with 4 additions and 1 deletions
|
@ -288,9 +288,12 @@ neverallow {
|
|||
|
||||
neverallow { domain userdebug_or_eng(`-shell') } nativetest_data_file:file no_x_file_perms;
|
||||
|
||||
# Only the init property service should write to /data/property.
|
||||
# Only the init property service should write to /data/property and /dev/__properties__
|
||||
neverallow { domain -init } property_data_file:dir no_w_dir_perms;
|
||||
neverallow { domain -init } property_data_file:file no_w_file_perms;
|
||||
neverallow { domain -init } property_type:file no_w_file_perms;
|
||||
neverallow { domain -init } properties_device:file no_w_file_perms;
|
||||
neverallow { domain -init } properties_serial:file no_w_file_perms;
|
||||
|
||||
# Only recovery should be doing writes to /system
|
||||
neverallow { domain -recovery } { system_file exec_type }:dir_file_class_set
|
||||
|
|
Loading…
Reference in a new issue