Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 1 | # Properties used only in /system |
2 | system_internal_prop(adbd_prop) | ||||
Richard Fung | 0c7c267 | 2021-11-08 20:09:54 +0000 | [diff] [blame] | 3 | system_internal_prop(apexd_payload_metadata_prop) |
David Anderson | 09bb944 | 2020-11-13 00:45:59 -0800 | [diff] [blame] | 4 | system_internal_prop(ctl_snapuserd_prop) |
Suren Baghdasaryan | 592e06c | 2021-08-04 12:31:43 -0700 | [diff] [blame] | 5 | system_internal_prop(device_config_lmkd_native_prop) |
Kalesh Singh | 9e25714 | 2022-04-06 14:31:26 -0700 | [diff] [blame] | 6 | system_internal_prop(device_config_mglru_native_prop) |
Yi Kong | 0ac0072 | 2020-10-27 02:29:52 +0800 | [diff] [blame] | 7 | system_internal_prop(device_config_profcollect_native_boot_prop) |
Vikram Gaur | e1c49f5 | 2022-09-29 21:20:22 +0000 | [diff] [blame] | 8 | system_internal_prop(device_config_remote_key_provisioning_native_prop) |
Tej Singh | dd0988f | 2020-11-17 19:26:23 -0800 | [diff] [blame] | 9 | system_internal_prop(device_config_statsd_native_prop) |
10 | system_internal_prop(device_config_statsd_native_boot_prop) | ||||
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 11 | system_internal_prop(device_config_storage_native_boot_prop) |
12 | system_internal_prop(device_config_sys_traced_prop) | ||||
13 | system_internal_prop(device_config_window_manager_native_boot_prop) | ||||
14 | system_internal_prop(device_config_configuration_prop) | ||||
Xiao Ma | 2d6c9f0 | 2021-02-02 10:27:38 +0000 | [diff] [blame] | 15 | system_internal_prop(device_config_connectivity_prop) |
Nick Chalko | 81a4dd4 | 2021-02-11 09:12:51 -0800 | [diff] [blame] | 16 | system_internal_prop(device_config_swcodec_native_prop) |
Alexander Potapenko | 0a64d10 | 2022-01-28 19:48:27 +0100 | [diff] [blame] | 17 | system_internal_prop(dmesgd_start_prop) |
Hongguang Chen | 91a5f4e | 2020-04-23 23:43:13 -0700 | [diff] [blame] | 18 | system_internal_prop(fastbootd_protocol_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 19 | system_internal_prop(gsid_prop) |
20 | system_internal_prop(init_perf_lsm_hooks_prop) | ||||
Inseob Kim | 15e5e0a | 2020-05-14 19:43:08 +0900 | [diff] [blame] | 21 | system_internal_prop(init_service_status_private_prop) |
Suren Baghdasaryan | 9fdb298 | 2022-09-07 13:13:47 -0700 | [diff] [blame] | 22 | system_internal_prop(init_storage_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 23 | system_internal_prop(init_svc_debug_prop) |
Hasini Gunasinghe | 4fa6b1a | 2021-07-02 23:14:50 +0000 | [diff] [blame] | 24 | system_internal_prop(keystore_crash_prop) |
Paul Crowley | b0c5571 | 2021-02-23 08:40:05 -0800 | [diff] [blame] | 25 | system_internal_prop(keystore_listen_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 26 | system_internal_prop(last_boot_reason_prop) |
Alexander Mishkovets | f0be89b | 2020-07-08 23:11:03 +0200 | [diff] [blame] | 27 | system_internal_prop(localization_prop) |
Primiano Tucci | cd45230 | 2020-10-09 09:15:10 +0100 | [diff] [blame] | 28 | system_internal_prop(lower_kptr_restrict_prop) |
Lorenzo Colitti | 082ebd2 | 2021-03-10 14:45:07 +0900 | [diff] [blame] | 29 | system_internal_prop(net_464xlat_fromvendor_prop) |
Lorenzo Colitti | 26d3d4a | 2021-03-10 15:31:36 +0900 | [diff] [blame] | 30 | system_internal_prop(net_connectivity_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 31 | system_internal_prop(netd_stable_secret_prop) |
Martijn Coenen | f2e4ee6 | 2021-03-16 08:34:30 +0100 | [diff] [blame] | 32 | system_internal_prop(odsign_prop) |
Michael Rosenfeld | 3ccbebb | 2021-02-10 18:45:35 -0800 | [diff] [blame] | 33 | system_internal_prop(perf_drop_caches_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 34 | system_internal_prop(pm_prop) |
Yi Kong | 9b65845 | 2021-03-22 22:02:22 +0800 | [diff] [blame] | 35 | system_internal_prop(profcollectd_node_id_prop) |
Nazanin | b373dd0 | 2021-04-29 21:52:42 -0700 | [diff] [blame] | 36 | system_internal_prop(radio_cdma_ecm_prop) |
Andrew Scull | edba76d | 2022-10-31 18:27:29 +0000 | [diff] [blame] | 37 | system_internal_prop(remote_prov_prop) |
JW Wang | 0f8cf04 | 2021-02-24 14:29:06 +0800 | [diff] [blame] | 38 | system_internal_prop(rollback_test_prop) |
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 39 | system_internal_prop(setupwizard_prop) |
David Anderson | bf5b6ce | 2021-07-26 15:03:11 -0700 | [diff] [blame] | 40 | system_internal_prop(snapuserd_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 41 | system_internal_prop(system_adbd_prop) |
Neil Fuller | bbb00fa | 2022-09-23 14:10:35 +0100 | [diff] [blame] | 42 | system_internal_prop(timezone_metadata_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 43 | system_internal_prop(traced_perf_enabled_prop) |
Hongguang | 9515559 | 2022-08-09 14:57:02 -0700 | [diff] [blame] | 44 | system_internal_prop(tuner_server_ctl_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 45 | system_internal_prop(userspace_reboot_log_prop) |
46 | system_internal_prop(userspace_reboot_test_prop) | ||||
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 47 | system_internal_prop(verity_status_prop) |
48 | system_internal_prop(zygote_wrap_prop) | ||||
hkuang | de370e5 | 2021-05-14 12:52:54 -0700 | [diff] [blame] | 49 | system_internal_prop(ctl_mediatranscoding_prop) |
Martijn Coenen | 5f21a0f | 2021-07-27 13:47:42 +0200 | [diff] [blame] | 50 | system_internal_prop(ctl_odsign_prop) |
Jiyong Park | b804de2 | 2021-09-16 21:06:20 +0900 | [diff] [blame] | 51 | system_internal_prop(virtualizationservice_prop) |
Jooyung Han | ccfb0ef | 2022-07-07 15:42:39 +0900 | [diff] [blame] | 52 | system_internal_prop(ctl_apex_load_prop) |
Inseob Kim | bbae4a9 | 2020-03-19 17:49:08 +0900 | [diff] [blame] | 53 | |
Andrew Scull | aedd65a | 2021-10-08 12:13:46 +0000 | [diff] [blame] | 54 | # Properties which can't be written outside system |
55 | system_restricted_prop(device_config_virtualization_framework_native_prop) | ||||
Jiyong Park | c4f84bc | 2022-09-18 23:09:53 +0900 | [diff] [blame] | 56 | system_restricted_prop(log_file_logger_prop) |
Andrew Scull | aedd65a | 2021-10-08 12:13:46 +0000 | [diff] [blame] | 57 | |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 58 | ### |
59 | ### Neverallow rules | ||||
60 | ### | ||||
61 | |||||
62 | treble_sysprop_neverallow(` | ||||
63 | |||||
Inseob Kim | afc0993 | 2020-09-28 13:32:43 +0900 | [diff] [blame] | 64 | enforce_sysprop_owner(` |
65 | neverallow domain { | ||||
66 | property_type | ||||
67 | -system_property_type | ||||
68 | -product_property_type | ||||
69 | -vendor_property_type | ||||
70 | }:file no_rw_file_perms; | ||||
71 | ') | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 72 | |
73 | neverallow { domain -coredomain } { | ||||
74 | system_property_type | ||||
75 | system_internal_property_type | ||||
76 | -system_restricted_property_type | ||||
77 | -system_public_property_type | ||||
78 | }:file no_rw_file_perms; | ||||
79 | |||||
80 | neverallow { domain -coredomain } { | ||||
81 | system_property_type | ||||
82 | -system_public_property_type | ||||
83 | }:property_service set; | ||||
84 | |||||
85 | # init is in coredomain, but should be able to read/write all props. | ||||
86 | # dumpstate is also in coredomain, but should be able to read all props. | ||||
87 | neverallow { coredomain -init -dumpstate } { | ||||
88 | vendor_property_type | ||||
89 | vendor_internal_property_type | ||||
90 | -vendor_restricted_property_type | ||||
91 | -vendor_public_property_type | ||||
92 | }:file no_rw_file_perms; | ||||
93 | |||||
94 | neverallow { coredomain -init } { | ||||
95 | vendor_property_type | ||||
96 | -vendor_public_property_type | ||||
97 | }:property_service set; | ||||
98 | |||||
99 | ') | ||||
100 | |||||
101 | # There is no need to perform ioctl or advisory locking operations on | ||||
102 | # property files. If this neverallow is being triggered, it is | ||||
103 | # likely that the policy is using r_file_perms directly instead of | ||||
104 | # the get_prop() macro. | ||||
105 | neverallow domain property_type:file { ioctl lock }; | ||||
106 | |||||
107 | neverallow * { | ||||
108 | core_property_type | ||||
109 | -audio_prop | ||||
110 | -config_prop | ||||
111 | -cppreopt_prop | ||||
112 | -dalvik_prop | ||||
113 | -debuggerd_prop | ||||
114 | -debug_prop | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 115 | -dhcp_prop |
116 | -dumpstate_prop | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 117 | -fingerprint_prop |
118 | -logd_prop | ||||
119 | -net_radio_prop | ||||
120 | -nfc_prop | ||||
121 | -ota_prop | ||||
122 | -pan_result_prop | ||||
123 | -persist_debug_prop | ||||
124 | -powerctl_prop | ||||
125 | -radio_prop | ||||
126 | -restorecon_prop | ||||
127 | -shell_prop | ||||
128 | -system_prop | ||||
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 129 | -usb_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 130 | -vold_prop |
131 | }:file no_rw_file_perms; | ||||
132 | |||||
133 | # sigstop property is only used for debugging; should only be set by su which is permissive | ||||
134 | # for userdebug/eng | ||||
135 | neverallow { | ||||
136 | domain | ||||
137 | -init | ||||
138 | -vendor_init | ||||
139 | } ctl_sigstop_prop:property_service set; | ||||
140 | |||||
141 | # Don't audit legacy ctl. property handling. We only want the newer permission check to appear | ||||
142 | # in the audit log | ||||
143 | dontaudit domain { | ||||
144 | ctl_bootanim_prop | ||||
145 | ctl_bugreport_prop | ||||
146 | ctl_console_prop | ||||
147 | ctl_default_prop | ||||
148 | ctl_dumpstate_prop | ||||
149 | ctl_fuse_prop | ||||
150 | ctl_mdnsd_prop | ||||
151 | ctl_rildaemon_prop | ||||
152 | }:property_service set; | ||||
153 | |||||
154 | neverallow { | ||||
155 | domain | ||||
156 | -init | ||||
Suren Baghdasaryan | 9fdb298 | 2022-09-07 13:13:47 -0700 | [diff] [blame] | 157 | -extra_free_kbytes |
158 | } init_storage_prop:property_service set; | ||||
159 | |||||
160 | neverallow { | ||||
161 | domain | ||||
162 | -init | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 163 | } init_svc_debug_prop:property_service set; |
164 | |||||
165 | neverallow { | ||||
166 | domain | ||||
167 | -init | ||||
168 | -dumpstate | ||||
169 | userdebug_or_eng(`-su') | ||||
170 | } init_svc_debug_prop:file no_rw_file_perms; | ||||
171 | |||||
172 | compatible_property_only(` | ||||
173 | # Prevent properties from being set | ||||
174 | neverallow { | ||||
175 | domain | ||||
176 | -coredomain | ||||
177 | -appdomain | ||||
178 | -vendor_init | ||||
179 | } { | ||||
180 | core_property_type | ||||
181 | extended_core_property_type | ||||
182 | exported_config_prop | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 183 | exported_default_prop |
184 | exported_dumpstate_prop | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 185 | exported_system_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 186 | exported3_system_prop |
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 187 | usb_control_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 188 | -nfc_prop |
189 | -powerctl_prop | ||||
190 | -radio_prop | ||||
191 | }:property_service set; | ||||
192 | |||||
193 | neverallow { | ||||
194 | domain | ||||
195 | -coredomain | ||||
196 | -appdomain | ||||
197 | -hal_nfc_server | ||||
198 | } { | ||||
199 | nfc_prop | ||||
200 | }:property_service set; | ||||
201 | |||||
202 | neverallow { | ||||
203 | domain | ||||
204 | -coredomain | ||||
205 | -appdomain | ||||
206 | -hal_telephony_server | ||||
207 | -vendor_init | ||||
208 | } { | ||||
Inseob Kim | acd02fc | 2020-07-28 15:17:24 +0900 | [diff] [blame] | 209 | radio_control_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 210 | }:property_service set; |
211 | |||||
212 | neverallow { | ||||
213 | domain | ||||
214 | -coredomain | ||||
215 | -appdomain | ||||
216 | -hal_telephony_server | ||||
217 | } { | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 218 | radio_prop |
219 | }:property_service set; | ||||
220 | |||||
221 | neverallow { | ||||
222 | domain | ||||
223 | -coredomain | ||||
224 | -bluetooth | ||||
225 | -hal_bluetooth_server | ||||
226 | } { | ||||
227 | bluetooth_prop | ||||
228 | }:property_service set; | ||||
229 | |||||
230 | neverallow { | ||||
231 | domain | ||||
232 | -coredomain | ||||
233 | -bluetooth | ||||
234 | -hal_bluetooth_server | ||||
235 | -vendor_init | ||||
236 | } { | ||||
237 | exported_bluetooth_prop | ||||
238 | }:property_service set; | ||||
239 | |||||
240 | neverallow { | ||||
241 | domain | ||||
242 | -coredomain | ||||
243 | -hal_camera_server | ||||
244 | -cameraserver | ||||
245 | -vendor_init | ||||
246 | } { | ||||
247 | exported_camera_prop | ||||
248 | }:property_service set; | ||||
249 | |||||
250 | neverallow { | ||||
251 | domain | ||||
252 | -coredomain | ||||
253 | -hal_wifi_server | ||||
254 | -wificond | ||||
255 | } { | ||||
256 | wifi_prop | ||||
257 | }:property_service set; | ||||
258 | |||||
259 | neverallow { | ||||
260 | domain | ||||
Inseob Kim | 3dbf3d8 | 2020-06-25 21:20:42 +0900 | [diff] [blame] | 261 | -init |
262 | -dumpstate | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 263 | -hal_wifi_server |
264 | -wificond | ||||
265 | -vendor_init | ||||
266 | } { | ||||
Inseob Kim | 3dbf3d8 | 2020-06-25 21:20:42 +0900 | [diff] [blame] | 267 | wifi_hal_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 268 | }:property_service set; |
269 | |||||
270 | # Prevent properties from being read | ||||
271 | neverallow { | ||||
272 | domain | ||||
273 | -coredomain | ||||
274 | -appdomain | ||||
275 | -vendor_init | ||||
276 | } { | ||||
277 | core_property_type | ||||
Jiakai Zhang | 22fb5c7 | 2023-03-30 15:50:05 +0100 | [diff] [blame^] | 278 | dalvik_config_prop_type |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 279 | extended_core_property_type |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 280 | exported3_system_prop |
Inseob Kim | fd2d6ec | 2020-04-01 10:01:16 +0900 | [diff] [blame] | 281 | systemsound_config_prop |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 282 | -debug_prop |
283 | -logd_prop | ||||
284 | -nfc_prop | ||||
285 | -powerctl_prop | ||||
286 | -radio_prop | ||||
287 | }:file no_rw_file_perms; | ||||
288 | |||||
289 | neverallow { | ||||
290 | domain | ||||
291 | -coredomain | ||||
292 | -appdomain | ||||
293 | -hal_nfc_server | ||||
294 | } { | ||||
295 | nfc_prop | ||||
296 | }:file no_rw_file_perms; | ||||
297 | |||||
298 | neverallow { | ||||
299 | domain | ||||
300 | -coredomain | ||||
301 | -appdomain | ||||
302 | -hal_telephony_server | ||||
303 | } { | ||||
304 | radio_prop | ||||
305 | }:file no_rw_file_perms; | ||||
306 | |||||
307 | neverallow { | ||||
308 | domain | ||||
309 | -coredomain | ||||
310 | -bluetooth | ||||
311 | -hal_bluetooth_server | ||||
312 | } { | ||||
313 | bluetooth_prop | ||||
314 | }:file no_rw_file_perms; | ||||
315 | |||||
316 | neverallow { | ||||
317 | domain | ||||
318 | -coredomain | ||||
319 | -hal_wifi_server | ||||
320 | -wificond | ||||
321 | } { | ||||
322 | wifi_prop | ||||
323 | }:file no_rw_file_perms; | ||||
Benjamin Schwartz | 3e4d97b | 2020-10-30 13:55:21 -0700 | [diff] [blame] | 324 | |
325 | neverallow { | ||||
326 | domain | ||||
Benjamin Schwartz | c171a1d | 2021-04-20 09:13:02 -0700 | [diff] [blame] | 327 | -coredomain |
328 | -vendor_init | ||||
Benjamin Schwartz | 3e4d97b | 2020-10-30 13:55:21 -0700 | [diff] [blame] | 329 | } { |
330 | suspend_prop | ||||
331 | }:property_service set; | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 332 | ') |
333 | |||||
334 | compatible_property_only(` | ||||
335 | # Neverallow coredomain to set vendor properties | ||||
336 | neverallow { | ||||
337 | coredomain | ||||
338 | -init | ||||
339 | -system_writes_vendor_properties_violators | ||||
340 | } { | ||||
341 | property_type | ||||
342 | -system_property_type | ||||
343 | -extended_core_property_type | ||||
344 | }:property_service set; | ||||
345 | ') | ||||
346 | |||||
347 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 348 | domain |
Inseob Kim | bfb3708 | 2020-04-27 23:49:15 +0900 | [diff] [blame] | 349 | -coredomain |
350 | -vendor_init | ||||
351 | } { | ||||
352 | ffs_config_prop | ||||
353 | ffs_control_prop | ||||
354 | }:file no_rw_file_perms; | ||||
355 | |||||
356 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 357 | domain |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 358 | -init |
359 | -system_server | ||||
360 | } { | ||||
361 | userspace_reboot_log_prop | ||||
362 | }:property_service set; | ||||
363 | |||||
364 | neverallow { | ||||
365 | # Only allow init and system_server to set system_adbd_prop | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 366 | domain |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 367 | -init |
368 | -system_server | ||||
369 | } { | ||||
370 | system_adbd_prop | ||||
371 | }:property_service set; | ||||
372 | |||||
Josh Gao | 0cac6fd | 2020-10-28 13:56:23 -0700 | [diff] [blame] | 373 | # Let (vendor_)init, adbd, and system_server set service.adb.tcp.port |
374 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 375 | domain |
Josh Gao | 0cac6fd | 2020-10-28 13:56:23 -0700 | [diff] [blame] | 376 | -init |
377 | -vendor_init | ||||
378 | -adbd | ||||
379 | -system_server | ||||
380 | } { | ||||
381 | adbd_config_prop | ||||
382 | }:property_service set; | ||||
383 | |||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 384 | neverallow { |
385 | # Only allow init and adbd to set adbd_prop | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 386 | domain |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 387 | -init |
388 | -adbd | ||||
389 | } { | ||||
390 | adbd_prop | ||||
391 | }:property_service set; | ||||
392 | |||||
393 | neverallow { | ||||
Richard Fung | 0c7c267 | 2021-11-08 20:09:54 +0000 | [diff] [blame] | 394 | # Only allow init to set apexd_payload_metadata_prop |
395 | domain | ||||
396 | -init | ||||
397 | } { | ||||
398 | apexd_payload_metadata_prop | ||||
399 | }:property_service set; | ||||
400 | |||||
401 | |||||
402 | neverallow { | ||||
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 403 | # Only allow init and shell to set userspace_reboot_test_prop |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 404 | domain |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 405 | -init |
406 | -shell | ||||
407 | } { | ||||
408 | userspace_reboot_test_prop | ||||
409 | }:property_service set; | ||||
Inseob Kim | 721d921 | 2020-04-24 21:25:17 +0900 | [diff] [blame] | 410 | |
411 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 412 | domain |
Inseob Kim | 721d921 | 2020-04-24 21:25:17 +0900 | [diff] [blame] | 413 | -init |
414 | -system_server | ||||
415 | -vendor_init | ||||
416 | } { | ||||
417 | surfaceflinger_color_prop | ||||
418 | }:property_service set; | ||||
Inseob Kim | 9add20f | 2020-05-06 22:20:35 +0900 | [diff] [blame] | 419 | |
420 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 421 | domain |
Inseob Kim | 9add20f | 2020-05-06 22:20:35 +0900 | [diff] [blame] | 422 | -init |
423 | } { | ||||
424 | libc_debug_prop | ||||
425 | }:property_service set; | ||||
Inseob Kim | 36aeb16 | 2020-05-08 20:42:25 +0900 | [diff] [blame] | 426 | |
Mitch Phillips | 8cd32cd | 2022-03-22 15:59:57 -0700 | [diff] [blame] | 427 | # Allow the shell to set MTE & GWP-ASan props, so that non-root users with adb |
428 | # shell access can control the settings on their device. Allow system apps to | ||||
429 | # set MTE props, so Developer Options can set them. | ||||
Mitch Phillips | eaf1404 | 2020-12-03 17:23:06 -0800 | [diff] [blame] | 430 | neverallow { |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 431 | domain |
Mitch Phillips | eaf1404 | 2020-12-03 17:23:06 -0800 | [diff] [blame] | 432 | -init |
433 | -shell | ||||
Florian Mayer | 39f29f7 | 2021-12-21 12:06:31 -0800 | [diff] [blame] | 434 | -system_app |
Florian Mayer | 152f832 | 2022-12-16 16:50:13 -0800 | [diff] [blame] | 435 | -system_server |
Florian Mayer | 51382a3 | 2022-09-21 14:53:48 -0700 | [diff] [blame] | 436 | -mtectrl |
Mitch Phillips | eaf1404 | 2020-12-03 17:23:06 -0800 | [diff] [blame] | 437 | } { |
438 | arm64_memtag_prop | ||||
Mitch Phillips | 8cd32cd | 2022-03-22 15:59:57 -0700 | [diff] [blame] | 439 | gwp_asan_prop |
Mitch Phillips | eaf1404 | 2020-12-03 17:23:06 -0800 | [diff] [blame] | 440 | }:property_service set; |
441 | |||||
Inseob Kim | 36aeb16 | 2020-05-08 20:42:25 +0900 | [diff] [blame] | 442 | neverallow { |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 443 | domain |
Inseob Kim | 36aeb16 | 2020-05-08 20:42:25 +0900 | [diff] [blame] | 444 | -init |
445 | -system_server | ||||
446 | -vendor_init | ||||
447 | } zram_control_prop:property_service set; | ||||
Inseob Kim | 1337e15 | 2020-05-12 22:51:48 +0900 | [diff] [blame] | 448 | |
449 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 450 | domain |
Inseob Kim | 1337e15 | 2020-05-12 22:51:48 +0900 | [diff] [blame] | 451 | -init |
452 | -system_server | ||||
453 | -vendor_init | ||||
454 | } dalvik_runtime_prop:property_service set; | ||||
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 455 | |
456 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 457 | domain |
Inseob Kim | dc1e501 | 2020-04-27 21:13:01 +0900 | [diff] [blame] | 458 | -coredomain |
459 | -vendor_init | ||||
460 | } { | ||||
461 | usb_config_prop | ||||
462 | usb_control_prop | ||||
463 | }:property_service set; | ||||
Inseob Kim | 3b82aec | 2020-05-14 01:38:40 +0900 | [diff] [blame] | 464 | |
465 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 466 | domain |
Inseob Kim | 3b82aec | 2020-05-14 01:38:40 +0900 | [diff] [blame] | 467 | -init |
468 | -system_server | ||||
469 | } { | ||||
470 | provisioned_prop | ||||
471 | retaildemo_prop | ||||
472 | }:property_service set; | ||||
473 | |||||
474 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 475 | domain |
Inseob Kim | 3b82aec | 2020-05-14 01:38:40 +0900 | [diff] [blame] | 476 | -coredomain |
477 | -vendor_init | ||||
478 | } { | ||||
479 | provisioned_prop | ||||
480 | retaildemo_prop | ||||
481 | }:file no_rw_file_perms; | ||||
Inseob Kim | 15e5e0a | 2020-05-14 19:43:08 +0900 | [diff] [blame] | 482 | |
483 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 484 | domain |
Inseob Kim | 15e5e0a | 2020-05-14 19:43:08 +0900 | [diff] [blame] | 485 | -init |
486 | } { | ||||
487 | init_service_status_private_prop | ||||
488 | init_service_status_prop | ||||
489 | }:property_service set; | ||||
Inseob Kim | ad63170 | 2020-05-14 21:47:43 +0900 | [diff] [blame] | 490 | |
491 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 492 | domain |
Inseob Kim | ad63170 | 2020-05-14 21:47:43 +0900 | [diff] [blame] | 493 | -init |
494 | -radio | ||||
495 | -appdomain | ||||
496 | -hal_telephony_server | ||||
Inseob Kim | 285da2f | 2020-06-04 20:29:43 +0900 | [diff] [blame] | 497 | not_compatible_property(`-vendor_init') |
Inseob Kim | ad63170 | 2020-05-14 21:47:43 +0900 | [diff] [blame] | 498 | } telephony_status_prop:property_service set; |
Peiyong Lin | 37dea07 | 2020-06-03 12:20:41 -0700 | [diff] [blame] | 499 | |
500 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 501 | domain |
Peiyong Lin | 37dea07 | 2020-06-03 12:20:41 -0700 | [diff] [blame] | 502 | -init |
503 | -vendor_init | ||||
504 | } { | ||||
505 | graphics_config_prop | ||||
506 | }:property_service set; | ||||
Inseob Kim | 6ffdf1b | 2020-06-16 20:00:41 +0900 | [diff] [blame] | 507 | |
508 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 509 | domain |
Amy Hsu | 0f352fb | 2020-06-15 17:04:12 +0800 | [diff] [blame] | 510 | -init |
Midas Chien | 0d0391f | 2020-06-17 22:13:21 +0800 | [diff] [blame] | 511 | -surfaceflinger |
Amy Hsu | 0f352fb | 2020-06-15 17:04:12 +0800 | [diff] [blame] | 512 | } { |
513 | surfaceflinger_display_prop | ||||
514 | }:property_service set; | ||||
515 | |||||
Inseob Kim | 072b014 | 2020-06-16 20:00:41 +0900 | [diff] [blame] | 516 | neverallow { |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 517 | domain |
Inseob Kim | 5eacf72 | 2020-07-01 01:27:49 +0900 | [diff] [blame] | 518 | -coredomain |
519 | -appdomain | ||||
Inseob Kim | 6ffdf1b | 2020-06-16 20:00:41 +0900 | [diff] [blame] | 520 | -vendor_init |
Inseob Kim | 6ffdf1b | 2020-06-16 20:00:41 +0900 | [diff] [blame] | 521 | } packagemanager_config_prop:file no_rw_file_perms; |
Inseob Kim | 04f435c | 2020-07-07 12:46:24 +0900 | [diff] [blame] | 522 | |
523 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 524 | domain |
Inseob Kim | 04f435c | 2020-07-07 12:46:24 +0900 | [diff] [blame] | 525 | -coredomain |
526 | -vendor_init | ||||
527 | } keyguard_config_prop:file no_rw_file_perms; | ||||
Alexander Mishkovets | f0be89b | 2020-07-08 23:11:03 +0200 | [diff] [blame] | 528 | |
529 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 530 | domain |
Alexander Mishkovets | f0be89b | 2020-07-08 23:11:03 +0200 | [diff] [blame] | 531 | -init |
532 | } { | ||||
533 | localization_prop | ||||
534 | }:property_service set; | ||||
Inseob Kim | c80b024 | 2020-07-16 22:25:47 +0900 | [diff] [blame] | 535 | |
536 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 537 | domain |
Inseob Kim | c80b024 | 2020-07-16 22:25:47 +0900 | [diff] [blame] | 538 | -init |
539 | -vendor_init | ||||
540 | -dumpstate | ||||
541 | -system_app | ||||
542 | } oem_unlock_prop:file no_rw_file_perms; | ||||
543 | |||||
544 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 545 | domain |
Inseob Kim | c80b024 | 2020-07-16 22:25:47 +0900 | [diff] [blame] | 546 | -coredomain |
547 | -vendor_init | ||||
548 | } storagemanager_config_prop:file no_rw_file_perms; | ||||
549 | |||||
550 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 551 | domain |
Inseob Kim | c80b024 | 2020-07-16 22:25:47 +0900 | [diff] [blame] | 552 | -init |
553 | -vendor_init | ||||
554 | -dumpstate | ||||
555 | -appdomain | ||||
556 | } sendbug_config_prop:file no_rw_file_perms; | ||||
Inseob Kim | c97a97c | 2020-07-20 20:26:07 +0900 | [diff] [blame] | 557 | |
558 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 559 | domain |
Inseob Kim | c97a97c | 2020-07-20 20:26:07 +0900 | [diff] [blame] | 560 | -init |
561 | -vendor_init | ||||
562 | -dumpstate | ||||
563 | -appdomain | ||||
564 | } camera_calibration_prop:file no_rw_file_perms; | ||||
Inseob Kim | 46dd4be | 2020-08-18 11:25:32 +0900 | [diff] [blame] | 565 | |
566 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 567 | domain |
Inseob Kim | 46dd4be | 2020-08-18 11:25:32 +0900 | [diff] [blame] | 568 | -init |
569 | -dumpstate | ||||
Jeff Vander Stoep | 684d25b | 2020-08-25 11:41:00 +0200 | [diff] [blame] | 570 | -hal_dumpstate_server |
Inseob Kim | 46dd4be | 2020-08-18 11:25:32 +0900 | [diff] [blame] | 571 | not_compatible_property(`-vendor_init') |
572 | } hal_dumpstate_config_prop:file no_rw_file_perms; | ||||
Primiano Tucci | cd45230 | 2020-10-09 09:15:10 +0100 | [diff] [blame] | 573 | |
574 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 575 | domain |
Primiano Tucci | cd45230 | 2020-10-09 09:15:10 +0100 | [diff] [blame] | 576 | -init |
Yabin Cui | bd4c9e8 | 2021-03-18 11:15:36 -0700 | [diff] [blame] | 577 | userdebug_or_eng(`-profcollectd') |
Yabin Cui | f17fb42 | 2021-11-24 14:06:07 -0800 | [diff] [blame] | 578 | userdebug_or_eng(`-simpleperf_boot') |
Primiano Tucci | cd45230 | 2020-10-09 09:15:10 +0100 | [diff] [blame] | 579 | userdebug_or_eng(`-traced_probes') |
Florian Mayer | 167407d | 2020-11-11 11:01:36 +0000 | [diff] [blame] | 580 | userdebug_or_eng(`-traced_perf') |
Primiano Tucci | cd45230 | 2020-10-09 09:15:10 +0100 | [diff] [blame] | 581 | } { |
582 | lower_kptr_restrict_prop | ||||
583 | }:property_service set; | ||||
Janis Danisevskis | 202e863 | 2020-10-23 11:16:34 -0700 | [diff] [blame] | 584 | |
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 585 | neverallow { |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 586 | domain |
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 587 | -init |
588 | } zygote_wrap_prop:property_service set; | ||||
589 | |||||
590 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 591 | domain |
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 592 | -init |
593 | } verity_status_prop:property_service set; | ||||
594 | |||||
595 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 596 | domain |
Inseob Kim | d5a0448 | 2020-11-05 22:17:26 +0900 | [diff] [blame] | 597 | -init |
598 | } setupwizard_prop:property_service set; | ||||
Inseob Kim | 9985566 | 2020-11-12 22:21:51 +0900 | [diff] [blame] | 599 | |
600 | # ro.product.property_source_order is useless after initialization of ro.product.* props. | ||||
601 | # So making it accessible only from init and vendor_init. | ||||
602 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 603 | domain |
Inseob Kim | 9985566 | 2020-11-12 22:21:51 +0900 | [diff] [blame] | 604 | -init |
605 | -dumpstate | ||||
606 | -vendor_init | ||||
607 | } build_config_prop:file no_rw_file_perms; | ||||
Inseob Kim | 0cef0fe | 2020-11-17 13:54:52 +0900 | [diff] [blame] | 608 | |
609 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 610 | domain |
Inseob Kim | 0cef0fe | 2020-11-17 13:54:52 +0900 | [diff] [blame] | 611 | -init |
612 | -shell | ||||
613 | } sqlite_log_prop:property_service set; | ||||
614 | |||||
615 | neverallow { | ||||
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 616 | domain |
Inseob Kim | 0cef0fe | 2020-11-17 13:54:52 +0900 | [diff] [blame] | 617 | -coredomain |
618 | -appdomain | ||||
619 | } sqlite_log_prop:file no_rw_file_perms; | ||||
Inseob Kim | 4c110ff | 2020-11-26 21:50:23 +0900 | [diff] [blame] | 620 | |
Inseob Kim | 5c011e5 | 2021-01-14 04:08:16 +0000 | [diff] [blame] | 621 | neverallow { |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 622 | domain |
Inseob Kim | 5c011e5 | 2021-01-14 04:08:16 +0000 | [diff] [blame] | 623 | -init |
624 | } default_prop:property_service set; | ||||
625 | |||||
Inseob Kim | 4c110ff | 2020-11-26 21:50:23 +0900 | [diff] [blame] | 626 | # Only one of system_property_type and vendor_property_type can be assigned. |
627 | # Property types having both attributes won't be accessible from anywhere. | ||||
628 | neverallow domain system_and_vendor_property_type:{file property_service} *; | ||||
JW Wang | 0f8cf04 | 2021-02-24 14:29:06 +0800 | [diff] [blame] | 629 | |
630 | neverallow { | ||||
Seth Moore | 8bfdd82 | 2022-04-20 10:10:49 -0700 | [diff] [blame] | 631 | domain |
632 | -init | ||||
Seth Moore | d3bd686 | 2023-02-24 11:50:51 -0800 | [diff] [blame] | 633 | -shell |
Vikram Gaur | 0139008 | 2023-03-16 01:41:29 +0000 | [diff] [blame] | 634 | -rkpdapp |
Seth Moore | 8bfdd82 | 2022-04-20 10:10:49 -0700 | [diff] [blame] | 635 | } remote_prov_prop:property_service set; |
636 | |||||
637 | neverallow { | ||||
JW Wang | 0f8cf04 | 2021-02-24 14:29:06 +0800 | [diff] [blame] | 638 | # Only allow init and shell to set rollback_test_prop |
Inseob Kim | 85acf6e | 2021-03-10 10:42:23 +0900 | [diff] [blame] | 639 | domain |
JW Wang | 0f8cf04 | 2021-02-24 14:29:06 +0800 | [diff] [blame] | 640 | -init |
641 | -shell | ||||
642 | } rollback_test_prop:property_service set; | ||||
Yi Kong | 9b65845 | 2021-03-22 22:02:22 +0800 | [diff] [blame] | 643 | |
644 | neverallow { | ||||
Jooyung Han | ccfb0ef | 2022-07-07 15:42:39 +0900 | [diff] [blame] | 645 | domain |
646 | -init | ||||
Jooyung Han | ccfb0ef | 2022-07-07 15:42:39 +0900 | [diff] [blame] | 647 | -apexd |
648 | } ctl_apex_load_prop:property_service set; | ||||
649 | |||||
650 | neverallow { | ||||
651 | domain | ||||
652 | -coredomain | ||||
653 | -init | ||||
654 | -dumpstate | ||||
655 | -apexd | ||||
Deyao Ren | 3fab00f | 2022-08-30 19:14:51 +0000 | [diff] [blame] | 656 | } ctl_apex_load_prop:file no_rw_file_perms; |
Jooyung Han | ccfb0ef | 2022-07-07 15:42:39 +0900 | [diff] [blame] | 657 | |
658 | neverallow { | ||||
Deyao Ren | 7848d3a | 2022-09-01 22:20:10 +0000 | [diff] [blame] | 659 | domain |
660 | -init | ||||
661 | -apexd | ||||
662 | } apex_ready_prop:property_service set; | ||||
663 | |||||
664 | neverallow { | ||||
665 | domain | ||||
666 | -coredomain | ||||
667 | -dumpstate | ||||
668 | -apexd | ||||
Jooyung Han | cae2368 | 2022-09-02 16:26:27 +0900 | [diff] [blame] | 669 | -vendor_init |
Deyao Ren | 7848d3a | 2022-09-01 22:20:10 +0000 | [diff] [blame] | 670 | } apex_ready_prop:file no_rw_file_perms; |
Inseob Kim | 55e5c9b | 2020-03-04 17:20:35 +0900 | [diff] [blame] | 671 | |
672 | neverallow { | ||||
673 | # Only allow init and profcollectd to access profcollectd_node_id_prop | ||||
674 | domain | ||||
675 | -init | ||||
676 | -dumpstate | ||||
677 | -profcollectd | ||||
678 | } profcollectd_node_id_prop:file r_file_perms; | ||||
679 | |||||
Jiyong Park | c4f84bc | 2022-09-18 23:09:53 +0900 | [diff] [blame] | 680 | neverallow { |
681 | domain | ||||
682 | -init | ||||
683 | } log_file_logger_prop:property_service set; | ||||
Avichal Rakesh | a12d310 | 2023-01-23 23:46:42 -0800 | [diff] [blame] | 684 | |
685 | neverallow { | ||||
686 | domain | ||||
687 | -init | ||||
688 | -vendor_init | ||||
689 | } usb_uvc_enabled_prop:property_service set; | ||||
Avichal Rakesh | e2cb0f2 | 2023-02-01 15:56:40 -0800 | [diff] [blame] | 690 | |
691 | # Disallow non system apps from reading ro.usb.uvc.enabled | ||||
692 | neverallow { | ||||
693 | appdomain | ||||
694 | -system_app | ||||
695 | -device_as_webcam | ||||
696 | } usb_uvc_enabled_prop:file no_rw_file_perms; |