Skip to content
Snippets Groups Projects
Commit 77285737 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by android-build-merger
Browse files

dumpstate: remove domain_deprecated attribute

am: 90ae4f6b

Change-Id: Ia793ed369cc05c123fb013fd10e8b19f006d92ff
parents 4e6f67fb 90ae4f6b
No related branches found
No related tags found
No related merge requests found
...@@ -149,7 +149,6 @@ allow domain_deprecated proc_meminfo:file r_file_perms; ...@@ -149,7 +149,6 @@ allow domain_deprecated proc_meminfo:file r_file_perms;
userdebug_or_eng(` userdebug_or_eng(`
auditallow { auditallow {
domain_deprecated domain_deprecated
-dumpstate
-fsck -fsck
-fsck_untrusted -fsck_untrusted
-sdcardd -sdcardd
...@@ -159,7 +158,6 @@ auditallow { ...@@ -159,7 +158,6 @@ auditallow {
} proc:file r_file_perms; } proc:file r_file_perms;
auditallow { auditallow {
domain_deprecated domain_deprecated
-dumpstate
-fsck -fsck
-fsck_untrusted -fsck_untrusted
-system_server -system_server
...@@ -167,7 +165,6 @@ auditallow { ...@@ -167,7 +165,6 @@ auditallow {
} proc:lnk_file { open ioctl lock }; # getattr read granted in domain } proc:lnk_file { open ioctl lock }; # getattr read granted in domain
auditallow { auditallow {
domain_deprecated domain_deprecated
-dumpstate
-fingerprintd -fingerprintd
-healthd -healthd
-netd -netd
...@@ -208,7 +205,6 @@ auditallow { ...@@ -208,7 +205,6 @@ auditallow {
auditallow { auditallow {
domain_deprecated domain_deprecated
-appdomain -appdomain
-dumpstate
-fingerprintd -fingerprintd
-healthd -healthd
-inputflinger -inputflinger
...@@ -222,7 +218,6 @@ auditallow { ...@@ -222,7 +218,6 @@ auditallow {
auditallow { auditallow {
domain_deprecated domain_deprecated
-appdomain -appdomain
-dumpstate
-fingerprintd -fingerprintd
-healthd -healthd
-inputflinger -inputflinger
......
...@@ -29,6 +29,9 @@ allow dumpstate system_file:file execute_no_trans; ...@@ -29,6 +29,9 @@ allow dumpstate system_file:file execute_no_trans;
not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;') not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;')
allow dumpstate toolbox_exec:file rx_file_perms; allow dumpstate toolbox_exec:file rx_file_perms;
# hidl searches for files in /system/lib(64)/hw/
allow dumpstate system_file:dir r_dir_perms;
# Create and write into /data/anr/ # Create and write into /data/anr/
allow dumpstate self:capability { dac_override chown fowner fsetid }; allow dumpstate self:capability { dac_override chown fowner fsetid };
allow dumpstate anr_data_file:dir rw_dir_perms; allow dumpstate anr_data_file:dir rw_dir_perms;
...@@ -83,10 +86,19 @@ allow dumpstate sysfs_usb:file w_file_perms; ...@@ -83,10 +86,19 @@ allow dumpstate sysfs_usb:file w_file_perms;
# Other random bits of data we want to collect # Other random bits of data we want to collect
allow dumpstate qtaguid_proc:file r_file_perms; allow dumpstate qtaguid_proc:file r_file_perms;
allow dumpstate debugfs:file r_file_perms; allow dumpstate debugfs:file r_file_perms;
# df for /storage/emulated needs search
allow dumpstate { block_device storage_file tmpfs }:dir { search getattr }; # df for
allow dumpstate {
block_device
cache_file
rootfs
selinuxfs
storage_file
tmpfs
}:dir { search getattr };
allow dumpstate fuse_device:chr_file getattr; allow dumpstate fuse_device:chr_file getattr;
allow dumpstate { dm_device cache_block_device }:blk_file getattr; allow dumpstate { dm_device cache_block_device }:blk_file getattr;
allow dumpstate { cache_file rootfs }:lnk_file { getattr read };
# Read /dev/cpuctl and /dev/cpuset # Read /dev/cpuctl and /dev/cpuset
r_dir_file(dumpstate, cgroup) r_dir_file(dumpstate, cgroup)
...@@ -137,7 +149,8 @@ read_logd(dumpstate) ...@@ -137,7 +149,8 @@ read_logd(dumpstate)
control_logd(dumpstate) control_logd(dumpstate)
read_runtime_log_tags(dumpstate) read_runtime_log_tags(dumpstate)
# Read /proc and /proc/net # Read files in /proc
allow dumpstate proc_meminfo:file r_file_perms;
allow dumpstate proc_net:file r_file_perms; allow dumpstate proc_net:file r_file_perms;
r_dir_file(dumpstate, proc) r_dir_file(dumpstate, proc)
...@@ -203,6 +216,9 @@ add_service(dumpstate, dumpstate_service) ...@@ -203,6 +216,9 @@ add_service(dumpstate, dumpstate_service)
# use /dev/ion for screen capture # use /dev/ion for screen capture
allow dumpstate ion_device:chr_file r_file_perms; allow dumpstate ion_device:chr_file r_file_perms;
# read default labeled files in /sys
r_dir_file(dumpstate, sysfs)
### ###
### neverallow rules ### neverallow rules
### ###
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment