Skip to content
Snippets Groups Projects
Commit 1d98c49f authored by Nick Kralevich's avatar Nick Kralevich Committed by Gerrit Code Review
Browse files

Merge "Deduplicate and rationalize system_server /proc/pid access."

parents 94c633dd c1812181
No related branches found
No related tags found
No related merge requests found
...@@ -74,9 +74,11 @@ allow system_server appdomain:process { sigkill signal }; ...@@ -74,9 +74,11 @@ allow system_server appdomain:process { sigkill signal };
allow system_server appdomain:process { getsched setsched }; allow system_server appdomain:process { getsched setsched };
allow system_server mediaserver:process { getsched setsched }; allow system_server mediaserver:process { getsched setsched };
# Read /proc data for apps. # Read /proc/pid data for apps.
allow system_server appdomain:dir r_dir_perms; r_dir_file(system_server, appdomain)
allow system_server appdomain:{ file lnk_file } rw_file_perms;
# Write to /proc/pid/oom_adj_score for apps.
allow system_server appdomain:file write;
# Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid. # Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid.
allow system_server qtaguid_proc:file rw_file_perms; allow system_server qtaguid_proc:file rw_file_perms;
...@@ -119,11 +121,10 @@ binder_call(system_server, appdomain) ...@@ -119,11 +121,10 @@ binder_call(system_server, appdomain)
binder_call(system_server, dumpstate) binder_call(system_server, dumpstate)
binder_service(system_server) binder_service(system_server)
# Read /proc/pid files for Binder clients. # Read /proc/pid files for dumping stack traces of native processes.
r_dir_file(system_server, appdomain)
r_dir_file(system_server, mediaserver) r_dir_file(system_server, mediaserver)
allow system_server appdomain:process getattr; r_dir_file(system_server, sdcardd)
allow system_server mediaserver:process getattr; r_dir_file(system_server, surfaceflinger)
# Use sockets received over binder from various services. # Use sockets received over binder from various services.
allow system_server mediaserver:tcp_socket rw_socket_perms; allow system_server mediaserver:tcp_socket rw_socket_perms;
...@@ -210,11 +211,6 @@ allow system_server cache_file:file { relabelfrom create_file_perms }; ...@@ -210,11 +211,6 @@ allow system_server cache_file:file { relabelfrom create_file_perms };
# Run system programs, e.g. dexopt. # Run system programs, e.g. dexopt.
allow system_server system_file:file x_file_perms; allow system_server system_file:file x_file_perms;
# Allow reading of /proc/pid data for other domains.
# XXX dontaudit candidate
allow system_server domain:dir r_dir_perms;
allow system_server domain:file r_file_perms;
# LocationManager(e.g, GPS) needs to read and write # LocationManager(e.g, GPS) needs to read and write
# to uart driver and ctrl proc entry # to uart driver and ctrl proc entry
allow system_server gps_device:chr_file rw_file_perms; allow system_server gps_device:chr_file rw_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment