Allow shell and adb to read tombstones
tombstones are now openable by these domains: allow adbd tombstone_data_file:dir { getattr ioctl lock open read search watch watch_reads }; allow adbd tombstone_data_file:file { getattr ioctl lock map open read watch watch_reads }; allow dumpstate tombstone_data_file:dir { getattr ioctl lock open read search watch watch_reads }; allow dumpstate tombstone_data_file:file { getattr ioctl lock map open read watch watch_reads }; allow init tombstone_data_file:dir { add_name create getattr ioctl open read relabelfrom relabelto remove_name rmdir search setattr write }; allow init tombstone_data_file:fifo_file { create getattr open read relabelfrom relabelto setattr unlink }; allow init tombstone_data_file:file { create getattr map open read relabelfrom relabelto setattr unlink write }; allow init tombstone_data_file:sock_file { create getattr open read relabelfrom relabelto setattr unlink }; allow shell tombstone_data_file:dir { getattr ioctl lock open read search watch watch_reads }; allow shell tombstone_data_file:file { getattr ioctl lock map open read watch watch_reads }; allow system_server tombstone_data_file:dir { add_name getattr ioctl lock open read remove_name search watch watch_reads write }; allow system_server tombstone_data_file:file { append create getattr ioctl lock map open read rename setattr unlink watch watch_reads write }; allow tombstoned tombstone_data_file:dir { add_name getattr ioctl lock open read remove_name search watch watch_reads write }; allow tombstoned tombstone_data_file:file { append create getattr ioctl link lock map open read rename setattr unlink watch watch_reads write }; Test: adb unroot, ls, cat, adb pull Bug: 312740614 Change-Id: I4a1af4fbdc48c5c5f4b0b33f124cea31af74dd87
This commit is contained in:
parent
bbff9f5ea1
commit
6c689e8438
3 changed files with 10 additions and 2 deletions
|
@ -226,6 +226,10 @@ allow adbd staging_data_file:file r_file_perms;
|
||||||
# Allow adbd to pull /apex/apex-info-list.xml for CTS tests.
|
# Allow adbd to pull /apex/apex-info-list.xml for CTS tests.
|
||||||
allow adbd apex_info_file:file r_file_perms;
|
allow adbd apex_info_file:file r_file_perms;
|
||||||
|
|
||||||
|
# allow reading tombstones. users can already use bugreports to get those.
|
||||||
|
allow adbd tombstone_data_file:dir r_dir_perms;
|
||||||
|
allow adbd tombstone_data_file:file r_file_perms;
|
||||||
|
|
||||||
###
|
###
|
||||||
### Neverallow rules
|
### Neverallow rules
|
||||||
###
|
###
|
||||||
|
|
|
@ -132,9 +132,9 @@ allow appdomain apex_art_data_file:dir r_dir_perms;
|
||||||
allow appdomain apex_art_data_file:file rx_file_perms;
|
allow appdomain apex_art_data_file:file rx_file_perms;
|
||||||
|
|
||||||
# Allow access to tombstones if an fd to one is given to you.
|
# Allow access to tombstones if an fd to one is given to you.
|
||||||
# This is restricted by unix permissions, so an app must go through system_server to get one.
|
# An app cannot open the tombstone itself because it lacks `open`.
|
||||||
allow appdomain tombstone_data_file:file { getattr read };
|
allow appdomain tombstone_data_file:file { getattr read };
|
||||||
neverallow appdomain tombstone_data_file:file ~{ getattr read };
|
neverallow { appdomain -shell } tombstone_data_file:file ~{ getattr read };
|
||||||
|
|
||||||
# Execute the shell or other system executables.
|
# Execute the shell or other system executables.
|
||||||
allow { appdomain -ephemeral_app -sdk_sandbox_all } shell_exec:file rx_file_perms;
|
allow { appdomain -ephemeral_app -sdk_sandbox_all } shell_exec:file rx_file_perms;
|
||||||
|
|
|
@ -17,6 +17,10 @@ userdebug_or_eng(`
|
||||||
# read config.gz for CTS purposes
|
# read config.gz for CTS purposes
|
||||||
allow shell config_gz:file r_file_perms;
|
allow shell config_gz:file r_file_perms;
|
||||||
|
|
||||||
|
# allow reading tombstones. users can already use bugreports to get those.
|
||||||
|
allow shell tombstone_data_file:dir r_dir_perms;
|
||||||
|
allow shell tombstone_data_file:file r_file_perms;
|
||||||
|
|
||||||
# Run app_process.
|
# Run app_process.
|
||||||
# XXX Transition into its own domain?
|
# XXX Transition into its own domain?
|
||||||
app_domain(shell)
|
app_domain(shell)
|
||||||
|
|
Loading…
Reference in a new issue