# Properties used only in /system system_internal_prop(adbd_prop) system_internal_prop(apexd_payload_metadata_prop) system_internal_prop(ctl_snapuserd_prop) system_internal_prop(device_config_lmkd_native_prop) system_internal_prop(device_config_mglru_native_prop) system_internal_prop(device_config_profcollect_native_boot_prop) system_internal_prop(device_config_statsd_native_prop) system_internal_prop(device_config_statsd_native_boot_prop) system_internal_prop(device_config_storage_native_boot_prop) system_internal_prop(device_config_sys_traced_prop) system_internal_prop(device_config_window_manager_native_boot_prop) system_internal_prop(device_config_configuration_prop) system_internal_prop(device_config_connectivity_prop) system_internal_prop(device_config_swcodec_native_prop) system_internal_prop(dmesgd_start_prop) system_internal_prop(fastbootd_protocol_prop) system_internal_prop(gsid_prop) system_internal_prop(init_perf_lsm_hooks_prop) system_internal_prop(init_service_status_private_prop) system_internal_prop(init_svc_debug_prop) system_internal_prop(keystore_crash_prop) system_internal_prop(keystore_listen_prop) system_internal_prop(last_boot_reason_prop) system_internal_prop(localization_prop) system_internal_prop(lower_kptr_restrict_prop) system_internal_prop(net_464xlat_fromvendor_prop) system_internal_prop(net_connectivity_prop) system_internal_prop(netd_stable_secret_prop) system_internal_prop(odsign_prop) system_internal_prop(perf_drop_caches_prop) system_internal_prop(pm_prop) system_internal_prop(profcollectd_node_id_prop) system_internal_prop(radio_cdma_ecm_prop) system_internal_prop(remote_prov_prop) system_internal_prop(rollback_test_prop) system_internal_prop(setupwizard_prop) system_internal_prop(snapuserd_prop) system_internal_prop(system_adbd_prop) system_internal_prop(traced_perf_enabled_prop) system_internal_prop(userspace_reboot_log_prop) system_internal_prop(userspace_reboot_test_prop) system_internal_prop(verity_status_prop) system_internal_prop(zygote_wrap_prop) system_internal_prop(ctl_mediatranscoding_prop) system_internal_prop(ctl_odsign_prop) system_internal_prop(virtualizationservice_prop) # Properties which can't be written outside system system_restricted_prop(device_config_virtualization_framework_native_prop) system_restricted_prop(system_user_mode_emulation_prop) ### ### Neverallow rules ### treble_sysprop_neverallow(` enforce_sysprop_owner(` neverallow domain { property_type -system_property_type -product_property_type -vendor_property_type }:file no_rw_file_perms; ') neverallow { domain -coredomain } { system_property_type system_internal_property_type -system_restricted_property_type -system_public_property_type }:file no_rw_file_perms; neverallow { domain -coredomain } { system_property_type -system_public_property_type }:property_service set; # init is in coredomain, but should be able to read/write all props. # dumpstate is also in coredomain, but should be able to read all props. neverallow { coredomain -init -dumpstate } { vendor_property_type vendor_internal_property_type -vendor_restricted_property_type -vendor_public_property_type }:file no_rw_file_perms; neverallow { coredomain -init } { vendor_property_type -vendor_public_property_type }:property_service set; ') # There is no need to perform ioctl or advisory locking operations on # property files. If this neverallow is being triggered, it is # likely that the policy is using r_file_perms directly instead of # the get_prop() macro. neverallow domain property_type:file { ioctl lock }; neverallow * { core_property_type -audio_prop -config_prop -cppreopt_prop -dalvik_prop -debuggerd_prop -debug_prop -dhcp_prop -dumpstate_prop -fingerprint_prop -logd_prop -net_radio_prop -nfc_prop -ota_prop -pan_result_prop -persist_debug_prop -powerctl_prop -radio_prop -restorecon_prop -shell_prop -system_prop -system_user_mode_emulation_prop -usb_prop -vold_prop }:file no_rw_file_perms; # sigstop property is only used for debugging; should only be set by su which is permissive # for userdebug/eng neverallow { domain -init -vendor_init } ctl_sigstop_prop:property_service set; # Don't audit legacy ctl. property handling. We only want the newer permission check to appear # in the audit log dontaudit domain { ctl_bootanim_prop ctl_bugreport_prop ctl_console_prop ctl_default_prop ctl_dumpstate_prop ctl_fuse_prop ctl_mdnsd_prop ctl_rildaemon_prop }:property_service set; neverallow { domain -init } init_svc_debug_prop:property_service set; neverallow { domain -init -dumpstate userdebug_or_eng(`-su') } init_svc_debug_prop:file no_rw_file_perms; compatible_property_only(` # Prevent properties from being set neverallow { domain -coredomain -appdomain -vendor_init } { core_property_type extended_core_property_type exported_config_prop exported_default_prop exported_dumpstate_prop exported_system_prop exported3_system_prop usb_control_prop -nfc_prop -powerctl_prop -radio_prop }:property_service set; neverallow { domain -coredomain -appdomain -hal_nfc_server } { nfc_prop }:property_service set; neverallow { domain -coredomain -appdomain -hal_telephony_server -vendor_init } { radio_control_prop }:property_service set; neverallow { domain -coredomain -appdomain -hal_telephony_server } { radio_prop }:property_service set; neverallow { domain -coredomain -bluetooth -hal_bluetooth_server } { bluetooth_prop }:property_service set; neverallow { domain -coredomain -bluetooth -hal_bluetooth_server -vendor_init } { exported_bluetooth_prop }:property_service set; neverallow { domain -coredomain -hal_camera_server -cameraserver -vendor_init } { exported_camera_prop }:property_service set; neverallow { domain -coredomain -hal_wifi_server -wificond } { wifi_prop }:property_service set; neverallow { domain -init -dumpstate -hal_wifi_server -wificond -vendor_init } { wifi_hal_prop }:property_service set; # Prevent properties from being read neverallow { domain -coredomain -appdomain -vendor_init } { core_property_type dalvik_config_prop extended_core_property_type exported3_system_prop systemsound_config_prop -debug_prop -logd_prop -nfc_prop -powerctl_prop -radio_prop }:file no_rw_file_perms; neverallow { domain -coredomain -appdomain -hal_nfc_server } { nfc_prop }:file no_rw_file_perms; neverallow { domain -coredomain -appdomain -hal_telephony_server } { radio_prop }:file no_rw_file_perms; neverallow { domain -coredomain -bluetooth -hal_bluetooth_server } { bluetooth_prop }:file no_rw_file_perms; neverallow { domain -coredomain -hal_wifi_server -wificond } { wifi_prop }:file no_rw_file_perms; neverallow { domain -coredomain -vendor_init } { suspend_prop }:property_service set; ') compatible_property_only(` # Neverallow coredomain to set vendor properties neverallow { coredomain -init -system_writes_vendor_properties_violators } { property_type -system_property_type -extended_core_property_type }:property_service set; ') neverallow { domain -coredomain -vendor_init } { ffs_config_prop ffs_control_prop }:file no_rw_file_perms; neverallow { domain -init -system_server } { userspace_reboot_log_prop }:property_service set; neverallow { # Only allow init and system_server to set system_adbd_prop domain -init -system_server } { system_adbd_prop }:property_service set; # Let (vendor_)init, adbd, and system_server set service.adb.tcp.port neverallow { domain -init -vendor_init -adbd -system_server } { adbd_config_prop }:property_service set; neverallow { # Only allow init and adbd to set adbd_prop domain -init -adbd } { adbd_prop }:property_service set; neverallow { # Only allow init to set apexd_payload_metadata_prop domain -init } { apexd_payload_metadata_prop }:property_service set; neverallow { # Only allow init and shell to set userspace_reboot_test_prop domain -init -shell } { userspace_reboot_test_prop }:property_service set; neverallow { domain -init -system_server -vendor_init } { surfaceflinger_color_prop }:property_service set; neverallow { domain -init } { libc_debug_prop }:property_service set; # Allow the shell to set MTE & GWP-ASan props, so that non-root users with adb # shell access can control the settings on their device. Allow system apps to # set MTE props, so Developer Options can set them. neverallow { domain -init -shell -system_app } { arm64_memtag_prop gwp_asan_prop }:property_service set; neverallow { domain -init -system_server -vendor_init } zram_control_prop:property_service set; neverallow { domain -init -system_server -vendor_init } dalvik_runtime_prop:property_service set; neverallow { domain -coredomain -vendor_init } { usb_config_prop usb_control_prop }:property_service set; neverallow { domain -init -system_server } { provisioned_prop retaildemo_prop }:property_service set; neverallow { domain -coredomain -vendor_init } { provisioned_prop retaildemo_prop }:file no_rw_file_perms; neverallow { domain -init } { init_service_status_private_prop init_service_status_prop }:property_service set; neverallow { domain -init -radio -appdomain -hal_telephony_server not_compatible_property(`-vendor_init') } telephony_status_prop:property_service set; neverallow { domain -init -vendor_init } { graphics_config_prop }:property_service set; neverallow { domain -init -surfaceflinger } { surfaceflinger_display_prop }:property_service set; neverallow { domain -coredomain -appdomain -vendor_init } packagemanager_config_prop:file no_rw_file_perms; neverallow { domain -coredomain -vendor_init } keyguard_config_prop:file no_rw_file_perms; neverallow { domain -init } { localization_prop }:property_service set; neverallow { domain -init -vendor_init -dumpstate -system_app } oem_unlock_prop:file no_rw_file_perms; neverallow { domain -coredomain -vendor_init } storagemanager_config_prop:file no_rw_file_perms; neverallow { domain -init -vendor_init -dumpstate -appdomain } sendbug_config_prop:file no_rw_file_perms; neverallow { domain -init -vendor_init -dumpstate -appdomain } camera_calibration_prop:file no_rw_file_perms; neverallow { domain -init -dumpstate -hal_dumpstate_server not_compatible_property(`-vendor_init') } hal_dumpstate_config_prop:file no_rw_file_perms; neverallow { domain -init userdebug_or_eng(`-profcollectd') userdebug_or_eng(`-simpleperf_boot') userdebug_or_eng(`-traced_probes') userdebug_or_eng(`-traced_perf') } { lower_kptr_restrict_prop }:property_service set; neverallow { domain -init } zygote_wrap_prop:property_service set; neverallow { domain -init } verity_status_prop:property_service set; neverallow { domain -init } setupwizard_prop:property_service set; # ro.product.property_source_order is useless after initialization of ro.product.* props. # So making it accessible only from init and vendor_init. neverallow { domain -init -dumpstate -vendor_init } build_config_prop:file no_rw_file_perms; neverallow { domain -init -shell } sqlite_log_prop:property_service set; neverallow { domain -coredomain -appdomain } sqlite_log_prop:file no_rw_file_perms; neverallow { domain -init } default_prop:property_service set; # Only one of system_property_type and vendor_property_type can be assigned. # Property types having both attributes won't be accessible from anywhere. neverallow domain system_and_vendor_property_type:{file property_service} *; neverallow { # Only init and the remote provisioner can set the ro.remote_provisioning.* props domain -init -remote_prov_app } remote_prov_prop:property_service set; neverallow { # Only allow init and shell to set rollback_test_prop domain -init -shell } rollback_test_prop:property_service set; neverallow { # Only allow init and profcollectd to access profcollectd_node_id_prop domain -init -dumpstate -profcollectd } profcollectd_node_id_prop:file r_file_perms;