Drop back-compatibility for hiding ro.debuggable and ro.secure
Ignore-AOSP-First: cherry-pick for tm-qpr-dev Bug: 193912100 Bug: 265874811 Test: N/A for cherry-pick Change-Id: I47f2ddc4fa87bf6c8f872d2679348b2eecddcaad Merged-In: I47f2ddc4fa87bf6c8f872d2679348b2eecddcaad
This commit is contained in:
parent
0d68fc3525
commit
c6aec92b7c
10 changed files with 12 additions and 31 deletions
|
@ -254,15 +254,3 @@ neverallow {
|
|||
|
||||
# Only privileged apps may find the incident service
|
||||
neverallow all_untrusted_apps incident_service:service_manager find;
|
||||
|
||||
# Do not allow untrusted app to read hidden system proprerties
|
||||
# We exclude older application for compatibility and we do not include in the exclusions other normally
|
||||
# untrusted applications such as mediaprovider due to the specific logging use cases.
|
||||
# Context: b/193912100
|
||||
neverallow {
|
||||
untrusted_app_all
|
||||
-untrusted_app_25
|
||||
-untrusted_app_27
|
||||
-untrusted_app_29
|
||||
-untrusted_app_30
|
||||
} { userdebug_or_eng_prop }:file read;
|
||||
|
|
|
@ -52,3 +52,6 @@ allow untrusted_app_25 mnt_sdcard_file:lnk_file r_file_perms;
|
|||
# allow sending RTM_GETNEIGH{TBL} messages.
|
||||
allow untrusted_app_25 self:netlink_route_socket nlmsg_getneigh;
|
||||
auditallow untrusted_app_25 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop({ untrusted_app_25 userdebug_or_eng(`-untrusted_app_25') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -40,3 +40,6 @@ allow untrusted_app_27 mnt_sdcard_file:lnk_file r_file_perms;
|
|||
# allow sending RTM_GETNEIGH{TBL} messages.
|
||||
allow untrusted_app_27 self:netlink_route_socket nlmsg_getneigh;
|
||||
auditallow untrusted_app_27 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop({ untrusted_app_27 userdebug_or_eng(`-untrusted_app_27') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -20,4 +20,4 @@ allow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
|
|||
auditallow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_29, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_29 userdebug_or_eng(`-untrusted_app_29') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -22,4 +22,4 @@ allow untrusted_app_30 self:netlink_route_socket nlmsg_getneigh;
|
|||
auditallow untrusted_app_30 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_30, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_30 userdebug_or_eng(`-untrusted_app_30') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -254,15 +254,3 @@ neverallow {
|
|||
|
||||
# Only privileged apps may find the incident service
|
||||
neverallow all_untrusted_apps incident_service:service_manager find;
|
||||
|
||||
# Do not allow untrusted app to read hidden system proprerties
|
||||
# We exclude older application for compatibility and we do not include in the exclusions other normally
|
||||
# untrusted applications such as mediaprovider due to the specific logging use cases.
|
||||
# Context: b/193912100
|
||||
neverallow {
|
||||
untrusted_app_all
|
||||
-untrusted_app_25
|
||||
-untrusted_app_27
|
||||
-untrusted_app_29
|
||||
-untrusted_app_30
|
||||
} { userdebug_or_eng_prop }:file read;
|
||||
|
|
|
@ -53,6 +53,5 @@ allow untrusted_app_25 mnt_sdcard_file:lnk_file r_file_perms;
|
|||
allow untrusted_app_25 self:netlink_route_socket nlmsg_getneigh;
|
||||
auditallow untrusted_app_25 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_25, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_25 userdebug_or_eng(`-untrusted_app_25') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -42,4 +42,4 @@ allow untrusted_app_27 self:netlink_route_socket nlmsg_getneigh;
|
|||
auditallow untrusted_app_27 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_27, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_27 userdebug_or_eng(`-untrusted_app_27') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -20,4 +20,4 @@ allow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
|
|||
auditallow untrusted_app_29 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_29, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_29 userdebug_or_eng(`-untrusted_app_29') }, userdebug_or_eng_prop)
|
||||
|
|
|
@ -22,4 +22,4 @@ allow untrusted_app_30 self:netlink_route_socket nlmsg_getneigh;
|
|||
auditallow untrusted_app_30 self:netlink_route_socket nlmsg_getneigh;
|
||||
|
||||
# Allow hidden build props
|
||||
get_prop(untrusted_app_30, userdebug_or_eng_prop)
|
||||
get_prop({ untrusted_app_30 userdebug_or_eng(`-untrusted_app_30') }, userdebug_or_eng_prop)
|
||||
|
|
Loading…
Reference in a new issue