Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

su.te

Blame
    • Jeff Vander Stoep's avatar
      d22987b4
      Create attribute for moving perms out of domain · d22987b4
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
      d22987b4
      History
      Create attribute for moving perms out of domain
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
    su.te 1.91 KiB
    # File types must be defined for file_contexts.
    type su_exec, exec_type, file_type;
    
    userdebug_or_eng(`
      # Domain used for su processes, as well as for adbd and adb shell
      # after performing an adb root command.  The domain definition is
      # wrapped to ensure that it does not exist at all on -user builds.
      type su, domain, domain_deprecated, mlstrustedsubject;
      domain_auto_trans(shell, su_exec, su)
    
      # Allow dumpstate to call su on userdebug / eng builds to collect
      # additional information.
      domain_auto_trans(dumpstate, su_exec, su)
    
      # Make sure that dumpstate runs the same from the "su" domain as
      # from the "init" domain.
      domain_auto_trans(su, dumpstate_exec, dumpstate)
    
      # su is also permissive to permit setenforce.
      permissive su;
    
      # Add su to various domains
      net_domain(su)
      app_domain(su)
    
      dontaudit su self:capability_class_set *;
      dontaudit su kernel:security *;
      dontaudit su kernel:system *;
      dontaudit su self:memprotect *;
      dontaudit su domain:process *;
      dontaudit su domain:fd *;
      dontaudit su domain:dir *;
      dontaudit su domain:lnk_file *;
      dontaudit su domain:{ fifo_file file } *;
      dontaudit su domain:socket_class_set *;
      dontaudit su domain:ipc_class_set *;
      dontaudit su domain:key *;
      dontaudit su fs_type:filesystem *;
      dontaudit su {fs_type dev_type file_type}:dir_file_class_set *;
      dontaudit su node_type:node *;
      dontaudit su node_type:{ tcp_socket udp_socket rawip_socket } *;
      dontaudit su netif_type:netif *;
      dontaudit su port_type:socket_class_set *;
      dontaudit su port_type:{ tcp_socket dccp_socket } *;
      dontaudit su domain:peer *;
      dontaudit su domain:binder *;
      dontaudit su property_type:property_service *;
      dontaudit su service_manager_type:service_manager *;
      dontaudit su servicemanager:service_manager list;
      dontaudit su keystore:keystore_key *;
      dontaudit su domain:debuggerd *;
      dontaudit su domain:drmservice *;
      dontaudit su unlabeled:filesystem *;
    ')