Skip to content
Snippets Groups Projects
Select Git revision
  • 2bcea0a3139faf0a8ae1cfe9cce88cde74e1a0bc
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

te_macros

Blame
    • Nick Kralevich's avatar
      2bcea0a3
      Don't grant domain device:dir rw_dir_perms · 2bcea0a3
      Nick Kralevich authored
      write_logd() is allowed for domain, which means that all domains
      are permitted read/write access to /dev. That's overly permissive
      and causes substantial differences between user and userdebug/eng
      devices.
      
      Remove domain device:dir rw_dir_perms access. It's not needed.
      
      Allow all domains to write/append to logd_debug. logd is responsible
      for creating this file if need be. Remove logd_debug file create
      permissions. This also eliminates the need for the type_transition
      rules.
      
      Bug: 15419803
      Change-Id: I7dc3c4df8d413c649c24ae7bc15546d64226ce3b
      2bcea0a3
      History
      Don't grant domain device:dir rw_dir_perms
      Nick Kralevich authored
      write_logd() is allowed for domain, which means that all domains
      are permitted read/write access to /dev. That's overly permissive
      and causes substantial differences between user and userdebug/eng
      devices.
      
      Remove domain device:dir rw_dir_perms access. It's not needed.
      
      Allow all domains to write/append to logd_debug. logd is responsible
      for creating this file if need be. Remove logd_debug file create
      permissions. This also eliminates the need for the type_transition
      rules.
      
      Bug: 15419803
      Change-Id: I7dc3c4df8d413c649c24ae7bc15546d64226ce3b
    gatekeeperd.te 1.29 KiB
    type gatekeeperd, domain;
    type gatekeeperd_exec, exec_type, file_type;
    
    # gatekeeperd
    binder_service(gatekeeperd)
    binder_use(gatekeeperd)
    
    ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
    ### These rules should eventually be granted only when needed.
    allow gatekeeperd tee_device:chr_file rw_file_perms;
    allow gatekeeperd ion_device:chr_file r_file_perms;
    # Load HAL implementation
    allow gatekeeperd system_file:dir r_dir_perms;
    ###
    
    ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
    ### These rules should eventually be granted only when needed.
    hwbinder_use(gatekeeperd)
    ###
    
    # need to find KeyStore and add self
    add_service(gatekeeperd, gatekeeper_service)
    
    # Need to add auth tokens to KeyStore
    use_keystore(gatekeeperd)
    allow gatekeeperd keystore:keystore_key { add_auth };
    
    # For permissions checking
    allow gatekeeperd system_server:binder call;
    allow gatekeeperd permission_service:service_manager find;
    
    # For parent user ID lookup
    allow gatekeeperd user_service:service_manager find;
    
    # for SID file access
    allow gatekeeperd gatekeeper_data_file:dir rw_dir_perms;
    allow gatekeeperd gatekeeper_data_file:file create_file_perms;
    
    # For hardware properties retrieval
    allow gatekeeperd hardware_properties_service:service_manager find;
    
    r_dir_file(gatekeeperd, cgroup)