5cf3994d8a
Revert the tightening of /proc/net access. These changes are causing a lot of denials, and I want additional time to figure out a better solution. Addresses the following denials (and many more): avc: denied { read } for comm="SyncAdapterThre" name="stats" dev="proc" ino=X scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { read } for comm="facebook.katana" name="iface_stat_fmt" dev="proc" ino=X scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { read } for comm="IntentService[C" name="if_inet6" dev="proc" ino=X scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { read } for comm="dumpstate" name="iface_stat_all" dev="proc" ino=X scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_net:s0 tclass=file This reverts commit0f0324cc82
and commit99940d1af5
Bug: 9496886 Bug: 19034637 Change-Id: I436a6e3638ac9ed49afbee214e752fe2b0112868
52 lines
1.5 KiB
Text
52 lines
1.5 KiB
Text
# phone subsystem
|
|
type radio, domain, mlstrustedsubject;
|
|
app_domain(radio)
|
|
net_domain(radio)
|
|
bluetooth_domain(radio)
|
|
binder_service(radio)
|
|
|
|
# Talks to init via the property socket.
|
|
unix_socket_connect(radio, property, init)
|
|
|
|
# Talks to rild via the rild socket.
|
|
unix_socket_connect(radio, rild, rild)
|
|
|
|
# Data file accesses.
|
|
allow radio radio_data_file:dir create_dir_perms;
|
|
allow radio radio_data_file:notdevfile_class_set create_file_perms;
|
|
|
|
allow radio alarm_device:chr_file rw_file_perms;
|
|
|
|
allow radio net_data_file:dir search;
|
|
allow radio net_data_file:file r_file_perms;
|
|
|
|
# Property service
|
|
allow radio radio_prop:property_service set;
|
|
allow radio net_radio_prop:property_service set;
|
|
allow radio system_radio_prop:property_service set;
|
|
auditallow radio net_radio_prop:property_service set;
|
|
auditallow radio system_radio_prop:property_service set;
|
|
|
|
# ctl interface
|
|
allow radio ctl_rildaemon_prop:property_service set;
|
|
|
|
allow radio drmserver_service:service_manager find;
|
|
allow radio mediaserver_service:service_manager find;
|
|
allow radio radio_service:service_manager { add find };
|
|
allow radio surfaceflinger_service:service_manager find;
|
|
allow radio system_server_service:service_manager find;
|
|
allow radio tmp_system_server_service:service_manager find;
|
|
|
|
service_manager_local_audit_domain(radio)
|
|
auditallow radio {
|
|
tmp_system_server_service
|
|
-activity_service
|
|
-appops_service
|
|
-connectivity_service
|
|
-content_service
|
|
-display_service
|
|
-dropbox_service
|
|
-network_management_service
|
|
-power_service
|
|
-registry_service
|
|
}:service_manager find;
|