Skip to content
Snippets Groups Projects
Commit b3b9475d authored by Max Bires's avatar Max Bires Committed by android-build-merger
Browse files

Merge "Adding a traceur_app domain to remove it from shell"

am: 64a0f928

Change-Id: I087db0855e429f4b15e4f312cfc6004007eb1f79
parents d597857f 64a0f928
No related branches found
No related tags found
No related merge requests found
......@@ -53,6 +53,8 @@
timezone_service
tombstoned_java_trace_socket
tombstone_wifi_data_file
traceur_app
traceur_app_tmpfs
update_engine_log_data_file
vendor_init
vold_prepare_subdirs
......
......@@ -72,6 +72,7 @@ full_treble_only(`
-init
userdebug_or_eng(`-perfprofd')
-shell
userdebug_or_eng(`-traceur_app')
-vendor_init
} debugfs_tracing:file no_rw_file_perms;
......
......@@ -95,6 +95,7 @@ neverallow user=shell domain=((?!shell).)*
neverallow isEphemeralApp=true domain=((?!ephemeral_app).)*
isSystemServer=true domain=system_server
user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
user=system seinfo=platform domain=system_app type=system_app_data_file
user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file
user=nfc seinfo=platform domain=nfc type=nfc_data_file
......
......@@ -51,7 +51,7 @@ binder_call(statsd, stats)
### neverallow rules
###
# Only system_server, system_app, and stats command can find the stats service.
# Only system_server, system_app, traceur_app, and stats command can find the stats service.
neverallow {
domain
-dumpstate
......@@ -60,6 +60,7 @@ neverallow {
-statsd
-system_app
-system_server
userdebug_or_eng(`-traceur_app')
} stats_service:service_manager find;
# Only statsd and the other root services in limited circumstances.
......
typeattribute traceur_app coredomain;
userdebug_or_eng(`
app_domain(traceur_app);
allow traceur_app debugfs_tracing:file r_file_perms;
allow traceur_app atrace_exec:file rx_file_perms;
')
......@@ -272,8 +272,14 @@ allow dumpstate self:netlink_generic_socket create_socket_perms_no_ioctl;
# accessing sensitive /proc/PID files, never for using ptrace attach.
neverallow dumpstate *:process ptrace;
# only system_server, dumpstate and shell can find the dumpstate service
neverallow { domain -system_server -shell -dumpstate } dumpstate_service:service_manager find;
# only system_server, dumpstate, traceur_app and shell can find the dumpstate service
neverallow {
domain
-system_server
-shell
userdebug_or_eng(`-traceur_app')
-dumpstate
} dumpstate_service:service_manager find;
# Dumpstate should not be writing to any generically labeled sysfs files.
# Create a specific label for the file type
......
type traceur_app, domain;
userdebug_or_eng(`
allow traceur_app servicemanager:service_manager list;
allow traceur_app hwservicemanager:hwservice_manager list;
set_prop(traceur_app, debug_prop)
allow traceur_app {
service_manager_type
-gatekeeper_service
-incident_service
-installd_service
-netd_service
-virtual_touchpad_service
-vold_service
-vr_hwc_service
}:service_manager find;
dontaudit traceur_app domain:binder call;
')
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment