dumpstate: remove domain_deprecated attribute

am: 90ae4f6b93

Change-Id: Ia793ed369cc05c123fb013fd10e8b19f006d92ff
This commit is contained in:
Jeff Vander Stoep 2017-07-10 16:44:05 +00:00 committed by android-build-merger
commit 772857373b
2 changed files with 19 additions and 8 deletions

View File

@ -149,7 +149,6 @@ allow domain_deprecated proc_meminfo:file r_file_perms;
userdebug_or_eng(`
auditallow {
domain_deprecated
-dumpstate
-fsck
-fsck_untrusted
-sdcardd
@ -159,7 +158,6 @@ auditallow {
} proc:file r_file_perms;
auditallow {
domain_deprecated
-dumpstate
-fsck
-fsck_untrusted
-system_server
@ -167,7 +165,6 @@ auditallow {
} proc:lnk_file { open ioctl lock }; # getattr read granted in domain
auditallow {
domain_deprecated
-dumpstate
-fingerprintd
-healthd
-netd
@ -208,7 +205,6 @@ auditallow {
auditallow {
domain_deprecated
-appdomain
-dumpstate
-fingerprintd
-healthd
-inputflinger
@ -222,7 +218,6 @@ auditallow {
auditallow {
domain_deprecated
-appdomain
-dumpstate
-fingerprintd
-healthd
-inputflinger

View File

@ -29,6 +29,9 @@ allow dumpstate system_file:file execute_no_trans;
not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;')
allow dumpstate toolbox_exec:file rx_file_perms;
# hidl searches for files in /system/lib(64)/hw/
allow dumpstate system_file:dir r_dir_perms;
# Create and write into /data/anr/
allow dumpstate self:capability { dac_override chown fowner fsetid };
allow dumpstate anr_data_file:dir rw_dir_perms;
@ -83,10 +86,19 @@ allow dumpstate sysfs_usb:file w_file_perms;
# Other random bits of data we want to collect
allow dumpstate qtaguid_proc:file r_file_perms;
allow dumpstate debugfs:file r_file_perms;
# df for /storage/emulated needs search
allow dumpstate { block_device storage_file tmpfs }:dir { search getattr };
# df for
allow dumpstate {
block_device
cache_file
rootfs
selinuxfs
storage_file
tmpfs
}:dir { search getattr };
allow dumpstate fuse_device:chr_file getattr;
allow dumpstate { dm_device cache_block_device }:blk_file getattr;
allow dumpstate { cache_file rootfs }:lnk_file { getattr read };
# Read /dev/cpuctl and /dev/cpuset
r_dir_file(dumpstate, cgroup)
@ -137,7 +149,8 @@ read_logd(dumpstate)
control_logd(dumpstate)
read_runtime_log_tags(dumpstate)
# Read /proc and /proc/net
# Read files in /proc
allow dumpstate proc_meminfo:file r_file_perms;
allow dumpstate proc_net:file r_file_perms;
r_dir_file(dumpstate, proc)
@ -203,6 +216,9 @@ add_service(dumpstate, dumpstate_service)
# use /dev/ion for screen capture
allow dumpstate ion_device:chr_file r_file_perms;
# read default labeled files in /sys
r_dir_file(dumpstate, sysfs)
###
### neverallow rules
###