diff --git a/public/domain_deprecated.te b/public/domain_deprecated.te index 0a39b96cba6014fcaf27a0fb02e79b5a7190b6f0..66acfd691772574a3305280abc82010cc43e3d5b 100644 --- a/public/domain_deprecated.te +++ b/public/domain_deprecated.te @@ -2,6 +2,7 @@ # Search /storage/emulated tmpfs mount. allow domain_deprecated tmpfs:dir r_dir_perms; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain @@ -11,20 +12,26 @@ auditallow { -vold -zygote } tmpfs:dir r_dir_perms; +') # Inherit or receive open files from others. allow domain_deprecated system_server:fd use; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain -netd -surfaceflinger } system_server:fd use; +') # Connect to adbd and use a socket transferred from it. # This is used for e.g. adb backup/restore. allow domain_deprecated adbd:fd use; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain -system_server } adbd:fd use; +') # Root fs. allow domain_deprecated rootfs:dir r_dir_perms; allow domain_deprecated rootfs:file r_file_perms; allow domain_deprecated rootfs:lnk_file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -fsck @@ -60,10 +67,12 @@ auditallow { -vold -zygote } rootfs:lnk_file { getattr open ioctl lock }; # read granted in domain +') # System file accesses. allow domain_deprecated system_file:dir r_dir_perms; allow domain_deprecated system_file:file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain @@ -85,10 +94,12 @@ auditallow { -system_server -zygote } system_file:file { ioctl lock }; # read open getattr in domain +') # Read files already opened under /data. allow domain_deprecated system_data_file:file { getattr read }; allow domain_deprecated system_data_file:lnk_file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain @@ -102,11 +113,13 @@ auditallow { -system_server -tee } system_data_file:lnk_file r_file_perms; +') # Read apk files under /data/app. allow domain_deprecated apk_data_file:dir { getattr search }; allow domain_deprecated apk_data_file:file r_file_perms; allow domain_deprecated apk_data_file:lnk_file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain @@ -128,11 +141,13 @@ auditallow { -installd -system_server } apk_data_file:lnk_file r_file_perms; +') # Read already opened /cache files. allow domain_deprecated cache_file:dir r_dir_perms; allow domain_deprecated cache_file:file { getattr read }; allow domain_deprecated cache_file:lnk_file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -system_server @@ -154,20 +169,34 @@ auditallow { -system_server -vold } cache_file:lnk_file r_file_perms; +') -#Allow access to ion memory allocation device +# Allow access to ion memory allocation device allow domain_deprecated ion_device:chr_file rw_file_perms; # split this auditallow into read and write perms since most domains seem to # only require read -auditallow { domain_deprecated -appdomain -fingerprintd -keystore -surfaceflinger -system_server -tee -vold -zygote } ion_device:chr_file r_file_perms; +userdebug_or_eng(` +auditallow { + domain_deprecated + -appdomain + -fingerprintd + -keystore + -surfaceflinger + -system_server + -tee + -vold + -zygote +} ion_device:chr_file r_file_perms; auditallow domain_deprecated ion_device:chr_file { write append }; +') # Read access to pseudo filesystems. r_dir_file(domain_deprecated, proc) r_dir_file(domain_deprecated, sysfs) r_dir_file(domain_deprecated, cgroup) allow domain_deprecated proc_meminfo:file r_file_perms; -#auditallow domain_deprecated proc:dir r_dir_perms; # r_dir_perms granted in domain + +userdebug_or_eng(` auditallow { domain_deprecated -fsck @@ -268,10 +297,12 @@ auditallow { -system_server -vold } proc_meminfo:file r_file_perms; +') # Get SELinux enforcing status. allow domain_deprecated selinuxfs:dir r_dir_perms; allow domain_deprecated selinuxfs:file r_file_perms; +userdebug_or_eng(` auditallow { domain_deprecated -appdomain @@ -296,3 +327,4 @@ auditallow { -ueventd -zygote } selinuxfs:file { open read ioctl lock }; # getattr granted in domain +')