Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
S
sepolicy
Manage
Activity
Members
Plan
Wiki
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Package Registry
Model registry
Operate
Terraform modules
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
CodeLinaro
public-release-test
platform
system
sepolicy
Commits
1d98c49f
Commit
1d98c49f
authored
11 years ago
by
Nick Kralevich
Committed by
Gerrit Code Review
11 years ago
Browse files
Options
Downloads
Plain Diff
Merge "Deduplicate and rationalize system_server /proc/pid access."
parents
94c633dd
c1812181
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
system_server.te
+8
-12
8 additions, 12 deletions
system_server.te
with
8 additions
and
12 deletions
system_server.te
+
8
−
12
View file @
1d98c49f
...
@@ -74,9 +74,11 @@ allow system_server appdomain:process { sigkill signal };
...
@@ -74,9 +74,11 @@ allow system_server appdomain:process { sigkill signal };
allow system_server appdomain:process { getsched setsched };
allow system_server appdomain:process { getsched setsched };
allow system_server mediaserver:process { getsched setsched };
allow system_server mediaserver:process { getsched setsched };
# Read /proc data for apps.
# Read /proc/pid data for apps.
allow system_server appdomain:dir r_dir_perms;
r_dir_file(system_server, appdomain)
allow system_server appdomain:{ file lnk_file } rw_file_perms;
# Write to /proc/pid/oom_adj_score for apps.
allow system_server appdomain:file write;
# Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid.
# Read/Write to /proc/net/xt_qtaguid/ctrl and and /dev/xt_qtaguid.
allow system_server qtaguid_proc:file rw_file_perms;
allow system_server qtaguid_proc:file rw_file_perms;
...
@@ -119,11 +121,10 @@ binder_call(system_server, appdomain)
...
@@ -119,11 +121,10 @@ binder_call(system_server, appdomain)
binder_call(system_server, dumpstate)
binder_call(system_server, dumpstate)
binder_service(system_server)
binder_service(system_server)
# Read /proc/pid files for Binder clients.
# Read /proc/pid files for dumping stack traces of native processes.
r_dir_file(system_server, appdomain)
r_dir_file(system_server, mediaserver)
r_dir_file(system_server, mediaserver)
allow
system_server
appdomain:process getattr;
r_dir_file(
system_server
, sdcardd)
allow
system_server
mediaserver:process getattr;
r_dir_file(
system_server
, surfaceflinger)
# Use sockets received over binder from various services.
# Use sockets received over binder from various services.
allow system_server mediaserver:tcp_socket rw_socket_perms;
allow system_server mediaserver:tcp_socket rw_socket_perms;
...
@@ -210,11 +211,6 @@ allow system_server cache_file:file { relabelfrom create_file_perms };
...
@@ -210,11 +211,6 @@ allow system_server cache_file:file { relabelfrom create_file_perms };
# Run system programs, e.g. dexopt.
# Run system programs, e.g. dexopt.
allow system_server system_file:file x_file_perms;
allow system_server system_file:file x_file_perms;
# Allow reading of /proc/pid data for other domains.
# XXX dontaudit candidate
allow system_server domain:dir r_dir_perms;
allow system_server domain:file r_file_perms;
# LocationManager(e.g, GPS) needs to read and write
# LocationManager(e.g, GPS) needs to read and write
# to uart driver and ctrl proc entry
# to uart driver and ctrl proc entry
allow system_server gps_device:chr_file rw_file_perms;
allow system_server gps_device:chr_file rw_file_perms;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment