Revert "Relax neverallows for vendor to use /system/bin/sh"
Revert submission 2964802-sh_path Reason for revert: <b/325569171> Reverted changes: /q/submissionid:2964802-sh_path Change-Id: I89e635e742d8f4f8a79afa1bb2646c7621705994
This commit is contained in:
parent
f0ba322926
commit
f77cf6780c
2 changed files with 1 additions and 13 deletions
|
@ -913,9 +913,6 @@ full_treble_only(`
|
||||||
-crash_dump_exec
|
-crash_dump_exec
|
||||||
-netutils_wrapper_exec
|
-netutils_wrapper_exec
|
||||||
userdebug_or_eng(`-tcpdump_exec')
|
userdebug_or_eng(`-tcpdump_exec')
|
||||||
# Vendor components still can invoke shell commands via /system/bin/sh
|
|
||||||
-shell_exec
|
|
||||||
-toolbox_exec
|
|
||||||
}:file { entrypoint execute execute_no_trans };
|
}:file { entrypoint execute execute_no_trans };
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -996,9 +993,6 @@ full_treble_only(`
|
||||||
-task_profiles_api_file
|
-task_profiles_api_file
|
||||||
-task_profiles_file
|
-task_profiles_file
|
||||||
userdebug_or_eng(`-tcpdump_exec')
|
userdebug_or_eng(`-tcpdump_exec')
|
||||||
# Vendor components still can invoke shell commands via /system/bin/sh
|
|
||||||
-shell_exec
|
|
||||||
-toolbox_exec
|
|
||||||
}:file *;
|
}:file *;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
|
@ -85,13 +85,7 @@ neverallow {
|
||||||
halserverdomain
|
halserverdomain
|
||||||
-hal_dumpstate_server
|
-hal_dumpstate_server
|
||||||
-hal_telephony_server
|
-hal_telephony_server
|
||||||
} {
|
} { file_type fs_type }:file execute_no_trans;
|
||||||
file_type
|
|
||||||
fs_type
|
|
||||||
# May invoke shell commands via /system/bin/sh
|
|
||||||
-shell_exec
|
|
||||||
-toolbox_exec
|
|
||||||
}:file execute_no_trans;
|
|
||||||
# Do not allow a process other than init to transition into a HAL domain.
|
# Do not allow a process other than init to transition into a HAL domain.
|
||||||
neverallow { domain -init } halserverdomain:process transition;
|
neverallow { domain -init } halserverdomain:process transition;
|
||||||
# Only allow transitioning to a domain by running its executable. Do not
|
# Only allow transitioning to a domain by running its executable. Do not
|
||||||
|
|
Loading…
Reference in a new issue