aboutsummaryrefslogtreecommitdiffstats
path: root/untrusted_app.te
diff options
context:
space:
mode:
authordcashman <dcashman@google.com>2015-01-16 17:27:25 -0800
committerdcashman <dcashman@google.com>2015-01-16 17:27:25 -0800
commit566e8fe2580ce7d6a8ef76ffce6b457b4e71dd63 (patch)
tree897e5c3e39c8833182298a1bcb96933188784d6a /untrusted_app.te
parent7d1deec4c48a5c15a12249aa841ec5dabab6f814 (diff)
downloadandroid_external_sepolicy-566e8fe2580ce7d6a8ef76ffce6b457b4e71dd63.tar.gz
android_external_sepolicy-566e8fe2580ce7d6a8ef76ffce6b457b4e71dd63.tar.bz2
android_external_sepolicy-566e8fe2580ce7d6a8ef76ffce6b457b4e71dd63.zip
Record service accesses.
Reduce logspam and record further observed service connections. Bug: 18106000 Change-Id: I9a57e4bb8f1c8e066861719fb208c691498842a8
Diffstat (limited to 'untrusted_app.te')
-rw-r--r--untrusted_app.te39
1 files changed, 2 insertions, 37 deletions
diff --git a/untrusted_app.te b/untrusted_app.te
index 18d71cd..ceb70f2 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -72,43 +72,6 @@ allow untrusted_app surfaceflinger_service:service_manager find;
allow untrusted_app system_server_service:service_manager find;
allow untrusted_app tmp_system_server_service:service_manager find;
-# address tmp_system_server_service accesses
-service_manager_local_audit_domain(untrusted_app)
-allow untrusted_app {
- accessibility_service
- account_service
- activity_service
- appops_service
- appwidget_service
- assetatlas_service
- audio_service
- backup_service
- batterystats_service
- bluetooth_manager_service
- connectivity_service
- content_service
- device_policy_service
- display_service
- dropbox_service
- input_method_service
- input_service
- jobscheduler_service
- location_service
- mount_service
- netstats_service
- network_score_service
- notification_service
- persistent_data_block_service
- power_service
- registry_service
- textservices_service
- trust_service
- uimode_service
- user_service
- webviewupdate_service
- wifi_service
-}:service_manager find;
-
service_manager_local_audit_domain(untrusted_app)
auditallow untrusted_app {
tmp_system_server_service
@@ -133,6 +96,7 @@ auditallow untrusted_app {
-location_service
-mount_service
-netstats_service
+ -network_management_service
-network_score_service
-notification_service
-persistent_data_block_service
@@ -142,6 +106,7 @@ auditallow untrusted_app {
-trust_service
-uimode_service
-user_service
+ -vibrator_service
-webviewupdate_service
-wifi_service
}:service_manager find;