Skip to content
Snippets Groups Projects
Commit 6f2f72c2 authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Get rid of auditallow spam.

am: 79a08e13

Change-Id: Iee32c3aab31156606142101a0f85a10383cdf712
parents 14742b0f 79a08e13
No related branches found
No related tags found
No related merge requests found
...@@ -108,6 +108,7 @@ auditallow { ...@@ -108,6 +108,7 @@ auditallow {
domain domain
-appdomain -appdomain
-dex2oat -dex2oat
-dumpstate
-recovery -recovery
-zygote -zygote
} libart_file:file { execute read open getattr }; } libart_file:file { execute read open getattr };
......
...@@ -62,8 +62,27 @@ auditallow { domain_deprecated -appdomain -dex2oat -installd -system_server } ap ...@@ -62,8 +62,27 @@ auditallow { domain_deprecated -appdomain -dex2oat -installd -system_server } ap
# Read /data/dalvik-cache. # Read /data/dalvik-cache.
allow domain_deprecated dalvikcache_data_file:dir { search getattr }; allow domain_deprecated dalvikcache_data_file:dir { search getattr };
allow domain_deprecated dalvikcache_data_file:file r_file_perms; allow domain_deprecated dalvikcache_data_file:file r_file_perms;
auditallow { domain_deprecated -appdomain -debuggerd -dex2oat -init -installd -system_server -zygote } dalvikcache_data_file:dir { search getattr }; auditallow {
auditallow { domain_deprecated -appdomain -debuggerd -dex2oat -installd -system_server -zygote } dalvikcache_data_file:file r_file_perms; domain_deprecated
-appdomain
-debuggerd
-dex2oat
-dumpstate
-init
-installd
-system_server
-zygote
} dalvikcache_data_file:dir { search getattr };
auditallow {
domain_deprecated
-appdomain
-debuggerd
-dex2oat
-dumpstate
-installd
-system_server
-zygote
} dalvikcache_data_file:file r_file_perms;
# Read already opened /cache files. # Read already opened /cache files.
allow domain_deprecated cache_file:dir r_dir_perms; allow domain_deprecated cache_file:dir r_dir_perms;
...@@ -100,7 +119,18 @@ auditallow { domain_deprecated -appdomain -fingerprintd -healthd -init -inputfli ...@@ -100,7 +119,18 @@ auditallow { domain_deprecated -appdomain -fingerprintd -healthd -init -inputfli
auditallow { domain_deprecated -appdomain -fingerprintd -healthd -init -inputflinger -installd -keystore -netd -rild -surfaceflinger -system_server -zygote } cgroup:{ file lnk_file } r_file_perms; auditallow { domain_deprecated -appdomain -fingerprintd -healthd -init -inputflinger -installd -keystore -netd -rild -surfaceflinger -system_server -zygote } cgroup:{ file lnk_file } r_file_perms;
auditallow { domain_deprecated -appdomain -init -priv_app -surfaceflinger -system_server -vold } proc_meminfo:file r_file_perms; auditallow { domain_deprecated -appdomain -init -priv_app -surfaceflinger -system_server -vold } proc_meminfo:file r_file_perms;
auditallow { domain_deprecated -appdomain -clatd -init -netd -system_server -vold -wpa -zygote } proc_net:dir { open getattr read ioctl lock }; # search granted in domain auditallow { domain_deprecated -appdomain -clatd -init -netd -system_server -vold -wpa -zygote } proc_net:dir { open getattr read ioctl lock }; # search granted in domain
auditallow { domain_deprecated -appdomain -clatd -init -netd -system_server -vold -wpa -zygote } proc_net:{ file lnk_file } r_file_perms; auditallow {
domain_deprecated
-appdomain
-clatd
-dumpstate
-init
-netd
-system_server
-vold
-wpa
-zygote
} proc_net:{ file lnk_file } r_file_perms;
# Get SELinux enforcing status. # Get SELinux enforcing status.
allow domain_deprecated selinuxfs:dir r_dir_perms; allow domain_deprecated selinuxfs:dir r_dir_perms;
......
...@@ -118,7 +118,9 @@ allow dumpstate ashmem_device:chr_file execute; ...@@ -118,7 +118,9 @@ allow dumpstate ashmem_device:chr_file execute;
allow dumpstate dumpstate_tmpfs:file execute; allow dumpstate dumpstate_tmpfs:file execute;
allow dumpstate self:process execmem; allow dumpstate self:process execmem;
# For art. # For art.
allow dumpstate dalvikcache_data_file:file execute; allow dumpstate libart_file:file { r_file_perms execute };
allow dumpstate dalvikcache_data_file:dir { search getattr };
allow dumpstate dalvikcache_data_file:file { r_file_perms execute };
allow dumpstate dalvikcache_data_file:lnk_file r_file_perms; allow dumpstate dalvikcache_data_file:lnk_file r_file_perms;
# For Bluetooth # For Bluetooth
...@@ -133,6 +135,9 @@ allow dumpstate gpu_device:chr_file rw_file_perms; ...@@ -133,6 +135,9 @@ allow dumpstate gpu_device:chr_file rw_file_perms;
read_logd(dumpstate) read_logd(dumpstate)
control_logd(dumpstate) control_logd(dumpstate)
# Read /proc/net
allow dumpstate proc_net:file r_file_perms;
# Read network state info files. # Read network state info files.
allow dumpstate net_data_file:dir search; allow dumpstate net_data_file:dir search;
allow dumpstate net_data_file:file r_file_perms; allow dumpstate net_data_file:file r_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment