Skip to content
Snippets Groups Projects
Commit f45db06c authored by Jeff Vander Stoep's avatar Jeff Vander Stoep
Browse files

Deprivilege haiku

Clatd and zygote
are all overprivileged
as is storaged

Test: Verify no "granted" messages from dogfooders. Build flash
aosp_taimen-userdebug. Verify no denials.
Change-Id: I735adcffed553962ad12072716a7200883930dcf
parent 9c7396d5
No related branches found
No related tags found
No related merge requests found
...@@ -5,10 +5,6 @@ type storaged_exec, exec_type, file_type; ...@@ -5,10 +5,6 @@ type storaged_exec, exec_type, file_type;
init_daemon_domain(storaged) init_daemon_domain(storaged)
# Read access to pseudo filesystems # Read access to pseudo filesystems
r_dir_file(storaged, proc_net_type)
userdebug_or_eng(`
auditallow storaged proc_net_type:{ dir file lnk_file } { getattr open read };
')
r_dir_file(storaged, domain) r_dir_file(storaged, domain)
# Read /proc/uid_io/stats # Read /proc/uid_io/stats
......
...@@ -92,12 +92,6 @@ allow zygote storage_file:dir { search mounton }; ...@@ -92,12 +92,6 @@ allow zygote storage_file:dir { search mounton };
# Handle --invoke-with command when launching Zygote with a wrapper command. # Handle --invoke-with command when launching Zygote with a wrapper command.
allow zygote zygote_exec:file rx_file_perms; allow zygote zygote_exec:file rx_file_perms;
# Read access to pseudo filesystems.
r_dir_file(zygote, proc_net_type)
userdebug_or_eng(`
auditallow zygote proc_net_type:{ dir file lnk_file } { getattr open read };
')
# Root fs. # Root fs.
r_dir_file(zygote, rootfs) r_dir_file(zygote, rootfs)
......
...@@ -6,10 +6,6 @@ type logd_exec, exec_type, file_type; ...@@ -6,10 +6,6 @@ type logd_exec, exec_type, file_type;
r_dir_file(logd, cgroup) r_dir_file(logd, cgroup)
r_dir_file(logd, proc_kmsg) r_dir_file(logd, proc_kmsg)
r_dir_file(logd, proc_meminfo) r_dir_file(logd, proc_meminfo)
r_dir_file(logd, proc_net_type)
userdebug_or_eng(`
auditallow logd proc_net_type:{ dir file lnk_file } { getattr open read };
')
allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
allow logd self:global_capability2_class_set syslog; allow logd self:global_capability2_class_set syslog;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment