Protect dropbox service data with selinux
Create a new label for /data/system/dropbox, and neverallow direct access to anything other than init and system_server. While all apps may write to the dropbox service, only apps with android.permission.READ_LOGS, a signature|privileged|development permission, may read them. Grant access to priv_app, system_app, and platform_app, and neverallow access to all untrusted_apps. Bug: 31681871 Test: atest CtsStatsdHostTestCases Test: atest DropBoxTest Test: atest ErrorsTests Change-Id: Ice302b74b13c4d66e07b069c1cdac55954d9f5df
Showing
- private/app_neverallows.te 5 additions, 0 deletionsprivate/app_neverallows.te
- private/compat/26.0/26.0.cil 1 addition, 0 deletionsprivate/compat/26.0/26.0.cil
- private/compat/27.0/27.0.cil 1 addition, 0 deletionsprivate/compat/27.0/27.0.cil
- private/domain.te 5 additions, 0 deletionsprivate/domain.te
- private/file_contexts 1 addition, 0 deletionsprivate/file_contexts
- private/platform_app.te 3 additions, 0 deletionsprivate/platform_app.te
- private/priv_app.te 3 additions, 0 deletionsprivate/priv_app.te
- private/system_app.te 3 additions, 0 deletionsprivate/system_app.te
- private/system_server.te 4 additions, 0 deletionsprivate/system_server.te
- public/file.te 2 additions, 0 deletionspublic/file.te
- public/init.te 1 addition, 1 deletionpublic/init.te
Please register or sign in to comment