Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
0d16b5ac
Commit
0d16b5ac
authored
10 years ago
by
dcashman
Committed by
Gerrit Code Review
10 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Remove known system_server service accesses from auditing."
parents
7818711a
c631ede7
No related branches found
No related tags found
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
platform_app.te
+14
-2
14 additions, 2 deletions
platform_app.te
system_app.te
+17
-0
17 additions, 0 deletions
system_app.te
system_server.te
+15
-2
15 additions, 2 deletions
system_server.te
untrusted_app.te
+41
-25
41 additions, 25 deletions
untrusted_app.te
with
87 additions
and
29 deletions
platform_app.te
+
14
−
2
View file @
0d16b5ac
...
...
@@ -36,12 +36,24 @@ allow platform_app system_server_service:service_manager find;
allow platform_app tmp_system_server_service:service_manager find;
# address tmp_system_server_service accesses
allow platform_app input_service:service_manager find;
allow platform_app lock_settings_service:service_manager find;
allow platform_app {
activity_service
connectivity_service
display_service
dropbox_service
input_service
lock_settings_service
mount_service
}:service_manager find;
service_manager_local_audit_domain(platform_app)
auditallow platform_app {
tmp_system_server_service
-activity_service
-connectivity_service
-display_service
-dropbox_service
-input_service
-lock_settings_service
-mount_service
}:service_manager find;
\ No newline at end of file
This diff is collapsed.
Click to expand it.
system_app.te
+
17
−
0
View file @
0d16b5ac
...
...
@@ -57,6 +57,23 @@ allow system_app system_app_service:service_manager add;
allow system_app system_server_service:service_manager find;
allow system_app tmp_system_server_service:service_manager find;
# address tmp_system_server_service accesses
allow system_app {
activity_service
connectivity_service
display_service
dropbox_service
}:service_manager find;
service_manager_local_audit_domain(system_app)
auditallow system_app {
tmp_system_server_service
-activity_service
-connectivity_service
-display_service
-dropbox_service
}:service_manager find;
allow system_app keystore:keystore_key {
test
get
...
...
This diff is collapsed.
Click to expand it.
system_server.te
+
15
−
2
View file @
0d16b5ac
...
...
@@ -383,17 +383,30 @@ auditallow system_server {
-radio_service
-system_server_service
-surfaceflinger_service
-tmp_system_server_service
}:service_manager find;
# address tmp_system_server_service accesses
allow system_server dreams_service:service_manager find;
allow system_server mount_service:service_manager find;
allow system_server {
account_service
backup_service
dreams_service
mount_service
package_service
wallpaper_service
wifi_service
}:service_manager find;
service_manager_local_audit_domain(system_server)
auditallow system_server {
tmp_system_server_service
-account_service
-backup_service
-dreams_service
-mount_service
-package_service
-wallpaper_service
-wifi_service
}:service_manager find;
allow system_server keystore:keystore_key {
...
...
This diff is collapsed.
Click to expand it.
untrusted_app.te
+
41
−
25
View file @
0d16b5ac
...
...
@@ -74,31 +74,40 @@ allow untrusted_app tmp_system_server_service:service_manager find;
# address tmp_system_server_service accesses
service_manager_local_audit_domain(untrusted_app)
allow untrusted_app accessibility_service:service_manager find;
allow untrusted_app account_service:service_manager find;
allow untrusted_app activity_service:service_manager find;
allow untrusted_app appops_service:service_manager find;
allow untrusted_app appwidget_service:service_manager find;
allow untrusted_app assetatlas_service:service_manager find;
allow untrusted_app audio_service:service_manager find;
allow untrusted_app bluetooth_manager_service:service_manager find;
allow untrusted_app connectivity_service:service_manager find;
allow untrusted_app content_service:service_manager find;
allow untrusted_app device_policy_service:service_manager find;
allow untrusted_app display_service:service_manager find;
allow untrusted_app dropbox_service:service_manager find;
allow untrusted_app input_method_service:service_manager find;
allow untrusted_app input_service:service_manager find;
allow untrusted_app jobscheduler_service:service_manager find;
allow untrusted_app notification_service:service_manager find;
allow untrusted_app persistent_data_block_service:service_manager find;
allow untrusted_app power_service:service_manager find;
allow untrusted_app registry_service:service_manager find;
allow untrusted_app textservices_service:service_manager find;
allow untrusted_app trust_service:service_manager find;
allow untrusted_app user_service:service_manager find;
allow untrusted_app webviewupdate_service:service_manager find;
allow untrusted_app wifi_service:service_manager find;
allow untrusted_app {
accessibility_service
account_service
activity_service
appops_service
appwidget_service
assetatlas_service
audio_service
backup_service
batterystats_service
bluetooth_manager_service
connectivity_service
content_service
device_policy_service
display_service
dropbox_service
input_method_service
input_service
jobscheduler_service
location_service
mount_service
netstats_service
network_score_service
notification_service
persistent_data_block_service
power_service
registry_service
textservices_service
trust_service
uimode_service
user_service
webviewupdate_service
wifi_service
}:service_manager find;
service_manager_local_audit_domain(untrusted_app)
auditallow untrusted_app {
...
...
@@ -110,6 +119,8 @@ auditallow untrusted_app {
-appwidget_service
-assetatlas_service
-audio_service
-backup_service
-batterystats_service
-bluetooth_manager_service
-connectivity_service
-content_service
...
...
@@ -119,12 +130,17 @@ auditallow untrusted_app {
-input_method_service
-input_service
-jobscheduler_service
-location_service
-mount_service
-netstats_service
-network_score_service
-notification_service
-persistent_data_block_service
-power_service
-registry_service
-textservices_service
-trust_service
-uimode_service
-user_service
-webviewupdate_service
-wifi_service
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment