Skip to content
Snippets Groups Projects
Commit 4e0f6546 authored by Max Bires's avatar Max Bires Committed by android-build-merger
Browse files

Merge "Adding a traceur_app domain to remove it from shell" am: 64a0f928

am: b3b9475d

Change-Id: I8b293af18af8d65d9931e0d5cfb59d733e4c381e
parents 0b1ce9e5 b3b9475d
No related branches found
No related tags found
No related merge requests found
...@@ -53,6 +53,8 @@ ...@@ -53,6 +53,8 @@
timezone_service timezone_service
tombstoned_java_trace_socket tombstoned_java_trace_socket
tombstone_wifi_data_file tombstone_wifi_data_file
traceur_app
traceur_app_tmpfs
update_engine_log_data_file update_engine_log_data_file
vendor_init vendor_init
vold_prepare_subdirs vold_prepare_subdirs
......
...@@ -72,6 +72,7 @@ full_treble_only(` ...@@ -72,6 +72,7 @@ full_treble_only(`
-init -init
userdebug_or_eng(`-perfprofd') userdebug_or_eng(`-perfprofd')
-shell -shell
userdebug_or_eng(`-traceur_app')
-vendor_init -vendor_init
} debugfs_tracing:file no_rw_file_perms; } debugfs_tracing:file no_rw_file_perms;
......
...@@ -95,6 +95,7 @@ neverallow user=shell domain=((?!shell).)* ...@@ -95,6 +95,7 @@ neverallow user=shell domain=((?!shell).)*
neverallow isEphemeralApp=true domain=((?!ephemeral_app).)* neverallow isEphemeralApp=true domain=((?!ephemeral_app).)*
isSystemServer=true domain=system_server isSystemServer=true domain=system_server
user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
user=system seinfo=platform domain=system_app type=system_app_data_file user=system seinfo=platform domain=system_app type=system_app_data_file
user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file
user=nfc seinfo=platform domain=nfc type=nfc_data_file user=nfc seinfo=platform domain=nfc type=nfc_data_file
......
...@@ -51,7 +51,7 @@ binder_call(statsd, stats) ...@@ -51,7 +51,7 @@ binder_call(statsd, stats)
### neverallow rules ### neverallow rules
### ###
# Only system_server, system_app, and stats command can find the stats service. # Only system_server, system_app, traceur_app, and stats command can find the stats service.
neverallow { neverallow {
domain domain
-dumpstate -dumpstate
...@@ -60,6 +60,7 @@ neverallow { ...@@ -60,6 +60,7 @@ neverallow {
-statsd -statsd
-system_app -system_app
-system_server -system_server
userdebug_or_eng(`-traceur_app')
} stats_service:service_manager find; } stats_service:service_manager find;
# Only statsd and the other root services in limited circumstances. # Only statsd and the other root services in limited circumstances.
......
typeattribute traceur_app coredomain;
userdebug_or_eng(`
app_domain(traceur_app);
allow traceur_app debugfs_tracing:file r_file_perms;
allow traceur_app atrace_exec:file rx_file_perms;
')
...@@ -272,8 +272,14 @@ allow dumpstate self:netlink_generic_socket create_socket_perms_no_ioctl; ...@@ -272,8 +272,14 @@ allow dumpstate self:netlink_generic_socket create_socket_perms_no_ioctl;
# accessing sensitive /proc/PID files, never for using ptrace attach. # accessing sensitive /proc/PID files, never for using ptrace attach.
neverallow dumpstate *:process ptrace; neverallow dumpstate *:process ptrace;
# only system_server, dumpstate and shell can find the dumpstate service # only system_server, dumpstate, traceur_app and shell can find the dumpstate service
neverallow { domain -system_server -shell -dumpstate } dumpstate_service:service_manager find; neverallow {
domain
-system_server
-shell
userdebug_or_eng(`-traceur_app')
-dumpstate
} dumpstate_service:service_manager find;
# Dumpstate should not be writing to any generically labeled sysfs files. # Dumpstate should not be writing to any generically labeled sysfs files.
# Create a specific label for the file type # Create a specific label for the file type
......
type traceur_app, domain;
userdebug_or_eng(`
allow traceur_app servicemanager:service_manager list;
allow traceur_app hwservicemanager:hwservice_manager list;
set_prop(traceur_app, debug_prop)
allow traceur_app {
service_manager_type
-gatekeeper_service
-incident_service
-installd_service
-netd_service
-virtual_touchpad_service
-vold_service
-vr_hwc_service
}:service_manager find;
dontaudit traceur_app domain:binder call;
')
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment