Skip to content
Snippets Groups Projects
Select Git revision
  • e2ba13b9ef97e843cc536c84c2043db0f19befeb
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

debuggerd.te

Blame
    • dcashman's avatar
      85f255b8
      DO NOT MERGE. Allow debuggerd read access to shared_relro files. · 85f255b8
      dcashman authored
      Addresses the following denial when debuggerd attempts to stat Webview mmap'd
      shared relro files on process crash.  Full read permissions may not be necessary:
      
      W/debuggerd(  185): type=1400 audit(0.0:97): avc: denied { search } for name="shared_relro" dev="mmcblk0p28" ino=618955 scontext=u:r:debuggerd:s0 tcontext=u:object_r:shared_relro_file:s0 tclass=dir
      
      Bug: 17101854
      Change-Id: I11eea85668ba033c554e5aab99b70a454fb75164
      85f255b8
      History
      DO NOT MERGE. Allow debuggerd read access to shared_relro files.
      dcashman authored
      Addresses the following denial when debuggerd attempts to stat Webview mmap'd
      shared relro files on process crash.  Full read permissions may not be necessary:
      
      W/debuggerd(  185): type=1400 audit(0.0:97): avc: denied { search } for name="shared_relro" dev="mmcblk0p28" ino=618955 scontext=u:r:debuggerd:s0 tcontext=u:object_r:shared_relro_file:s0 tclass=dir
      
      Bug: 17101854
      Change-Id: I11eea85668ba033c554e5aab99b70a454fb75164
    security_classes 1.94 KiB
    # FLASK
    
    #
    # Define the security object classes
    #
    
    # Classes marked as userspace are classes
    # for userspace object managers
    
    class security
    class process
    class system
    class capability
    
    # file-related classes
    class filesystem
    class file
    class dir
    class fd
    class lnk_file
    class chr_file
    class blk_file
    class sock_file
    class fifo_file
    
    # network-related classes
    class socket
    class tcp_socket
    class udp_socket
    class rawip_socket
    class node
    class netif
    class netlink_socket
    class packet_socket
    class key_socket
    class unix_stream_socket
    class unix_dgram_socket
    
    # sysv-ipc-related classes
    class sem
    class msg
    class msgq
    class shm
    class ipc
    
    # extended netlink sockets
    class netlink_route_socket
    class netlink_firewall_socket
    class netlink_tcpdiag_socket
    class netlink_nflog_socket
    class netlink_xfrm_socket
    class netlink_selinux_socket
    class netlink_audit_socket
    class netlink_ip6fw_socket
    class netlink_dnrt_socket
    
    # IPSec association
    class association
    
    # Updated Netlink class for KOBJECT_UEVENT family.
    class netlink_kobject_uevent_socket
    
    class appletalk_socket
    
    class packet
    
    # Kernel access key retention
    class key
    
    class dccp_socket
    
    class memprotect
    
    # network peer labels
    class peer
    
    # Capabilities >= 32
    class capability2
    
    # kernel services that need to override task security, e.g. cachefiles
    class kernel_service
    
    class tun_socket
    
    class binder
    
    # Updated netlink classes for more recent netlink protocols.
    class netlink_iscsi_socket
    class netlink_fib_lookup_socket
    class netlink_connector_socket
    class netlink_netfilter_socket
    class netlink_generic_socket
    class netlink_scsitransport_socket
    class netlink_rdma_socket
    class netlink_crypto_socket
    
    # Capability checks when on a non-init user namespace
    class cap_userns
    class cap2_userns
    
    # Property service
    class property_service          # userspace
    
    # Service manager
    class service_manager           # userspace
    
    # Keystore Key
    class keystore_key              # userspace
    
    class drmservice                # userspace
    # FLASK