Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
d5d98a4d
Commit
d5d98a4d
authored
7 years ago
by
Jeff Vander Stoep
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
dumpstate: remove domain_deprecated attribute am:
90ae4f6b
am:
77285737
Change-Id: I19c2b7107293fbe903cd6601f36b85aa3d099f80
parents
55efefc3
77285737
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
private/domain_deprecated.te
+0
-5
0 additions, 5 deletions
private/domain_deprecated.te
public/dumpstate.te
+19
-3
19 additions, 3 deletions
public/dumpstate.te
with
19 additions
and
8 deletions
private/domain_deprecated.te
+
0
−
5
View file @
d5d98a4d
...
...
@@ -149,7 +149,6 @@ allow domain_deprecated proc_meminfo:file r_file_perms;
userdebug_or_eng(`
auditallow {
domain_deprecated
-dumpstate
-fsck
-fsck_untrusted
-sdcardd
...
...
@@ -159,7 +158,6 @@ auditallow {
} proc:file r_file_perms;
auditallow {
domain_deprecated
-dumpstate
-fsck
-fsck_untrusted
-system_server
...
...
@@ -167,7 +165,6 @@ auditallow {
} proc:lnk_file { open ioctl lock }; # getattr read granted in domain
auditallow {
domain_deprecated
-dumpstate
-fingerprintd
-healthd
-netd
...
...
@@ -208,7 +205,6 @@ auditallow {
auditallow {
domain_deprecated
-appdomain
-dumpstate
-fingerprintd
-healthd
-inputflinger
...
...
@@ -222,7 +218,6 @@ auditallow {
auditallow {
domain_deprecated
-appdomain
-dumpstate
-fingerprintd
-healthd
-inputflinger
...
...
This diff is collapsed.
Click to expand it.
public/dumpstate.te
+
19
−
3
View file @
d5d98a4d
...
...
@@ -29,6 +29,9 @@ allow dumpstate system_file:file execute_no_trans;
not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;')
allow dumpstate toolbox_exec:file rx_file_perms;
# hidl searches for files in /system/lib(64)/hw/
allow dumpstate system_file:dir r_dir_perms;
# Create and write into /data/anr/
allow dumpstate self:capability { dac_override chown fowner fsetid };
allow dumpstate anr_data_file:dir rw_dir_perms;
...
...
@@ -83,10 +86,19 @@ allow dumpstate sysfs_usb:file w_file_perms;
# Other random bits of data we want to collect
allow dumpstate qtaguid_proc:file r_file_perms;
allow dumpstate debugfs:file r_file_perms;
# df for /storage/emulated needs search
allow dumpstate { block_device storage_file tmpfs }:dir { search getattr };
# df for
allow dumpstate {
block_device
cache_file
rootfs
selinuxfs
storage_file
tmpfs
}:dir { search getattr };
allow dumpstate fuse_device:chr_file getattr;
allow dumpstate { dm_device cache_block_device }:blk_file getattr;
allow dumpstate { cache_file rootfs }:lnk_file { getattr read };
# Read /dev/cpuctl and /dev/cpuset
r_dir_file(dumpstate, cgroup)
...
...
@@ -137,7 +149,8 @@ read_logd(dumpstate)
control_logd(dumpstate)
read_runtime_log_tags(dumpstate)
# Read /proc and /proc/net
# Read files in /proc
allow dumpstate proc_meminfo:file r_file_perms;
allow dumpstate proc_net:file r_file_perms;
r_dir_file(dumpstate, proc)
...
...
@@ -203,6 +216,9 @@ add_service(dumpstate, dumpstate_service)
# use /dev/ion for screen capture
allow dumpstate ion_device:chr_file r_file_perms;
# read default labeled files in /sys
r_dir_file(dumpstate, sysfs)
###
### neverallow rules
###
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment