Skip to content
Snippets Groups Projects
Commit a3e85728 authored by Tri Vo's avatar Tri Vo Committed by Gerrit Code Review
Browse files

Merge "priv_app: remove access to 'proc' and 'sysfs' types."

parents 4f6eb37f f92cfb9e
No related branches found
No related tags found
No related merge requests found
...@@ -25,7 +25,6 @@ full_treble_only(` ...@@ -25,7 +25,6 @@ full_treble_only(`
neverallow { neverallow {
coredomain coredomain
-dumpstate -dumpstate
-priv_app
-vold -vold
-vendor_init -vendor_init
} proc:file no_rw_file_perms; } proc:file no_rw_file_perms;
...@@ -35,7 +34,6 @@ full_treble_only(` ...@@ -35,7 +34,6 @@ full_treble_only(`
coredomain coredomain
-dumpstate -dumpstate
-init -init
-priv_app
-ueventd -ueventd
-vold -vold
-vendor_init -vendor_init
......
...@@ -77,9 +77,17 @@ userdebug_or_eng(` ...@@ -77,9 +77,17 @@ userdebug_or_eng(`
allow priv_app vold:fd use; allow priv_app vold:fd use;
allow priv_app fuse_device:chr_file { read write }; allow priv_app fuse_device:chr_file { read write };
# /sys and /proc access # /proc access
r_dir_file(priv_app, sysfs_type) allow priv_app {
r_dir_file(priv_app, proc) proc_vmstat
}:file r_file_perms;
allow priv_app sysfs_type:dir search;
# Read access to /sys/class/net/wlan*/address
r_dir_file(priv_app, sysfs_net)
# Read access to /sys/block/zram*/mm_stat
r_dir_file(priv_app, sysfs_zram)
r_dir_file(priv_app, rootfs) r_dir_file(priv_app, rootfs)
# Allow GMS core to open kernel config for OTA matching through libvintf # Allow GMS core to open kernel config for OTA matching through libvintf
...@@ -129,6 +137,7 @@ unix_socket_connect(priv_app, traced_producer, traced) ...@@ -129,6 +137,7 @@ unix_socket_connect(priv_app, traced_producer, traced)
# suppress denials for non-API accesses. # suppress denials for non-API accesses.
dontaudit priv_app exec_type:file getattr; dontaudit priv_app exec_type:file getattr;
dontaudit priv_app device:dir read; dontaudit priv_app device:dir read;
dontaudit priv_app proc:file read;
dontaudit priv_app proc_interrupts:file read; dontaudit priv_app proc_interrupts:file read;
dontaudit priv_app proc_modules:file read; dontaudit priv_app proc_modules:file read;
dontaudit priv_app proc_version:file read; dontaudit priv_app proc_version:file read;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment