blob: 733bb330c8f9fe68303c184d21c327ba1ebddcd3 [file] [log] [blame]
Inseob Kimfa4c5bf2022-07-13 18:57:55 +09001system_internal_prop(ctl_tombstoned_prop)
2
Victor Hsieha62b3ff2022-05-02 09:47:11 -07003system_restricted_prop(boot_status_prop)
4
Victor Hsiehb415c732021-12-14 11:06:23 -08005# Declare ART properties for CompOS
6system_public_prop(dalvik_config_prop)
7system_restricted_prop(device_config_runtime_native_prop)
Victor Hsieh3423bc42022-05-10 16:14:30 -07008system_restricted_prop(device_config_runtime_native_boot_prop)
Victor Hsiehb415c732021-12-14 11:06:23 -08009
Inseob Kim5ee61a72021-09-17 19:31:45 +090010# Don't audit legacy ctl. property handling. We only want the newer permission check to appear
11# in the audit log
12dontaudit domain {
13 ctl_console_prop
14 ctl_default_prop
15 ctl_fuse_prop
16}:property_service set;
17
Inseob Kime1389972021-07-19 07:48:34 +000018###
19### Neverallow rules
20###
21
Jiyong Park27bb6c62021-09-06 15:39:31 +090022# microdroid_manager_roothash_prop can only be set by microdroid_manager
23# and read by apkdmverity
24neverallow {
25 domain
26 -init
27 -microdroid_manager
28} microdroid_manager_roothash_prop:property_service set;
29
30neverallow {
31 domain
32 -init
33 -microdroid_manager
34 -apkdmverity
35} microdroid_manager_roothash_prop:file no_rw_file_perms;
Richard Fung0c7c2672021-11-08 20:09:54 +000036
37# apexd_payload_metadata_prop can only set by init
38neverallow {
39 domain
40 -init
41} apexd_payload_metadata_prop:property_service set;
Nikita Ioffe1cf4d772022-11-27 01:11:39 +000042
43# Only microdroid_manager and init can set the microdroid_config_prop sysprops
44neverallow {
45 domain
46 -init
47 -microdroid_manager
48} microdroid_config_prop:property_service set;
49
50neverallow {
51 domain
52 -init
53 -microdroid_manager
54} microdroid_config_prop:file no_rw_file_perms;