Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
16b4b927
Commit
16b4b927
authored
8 years ago
by
Nick Kralevich
Committed by
android-build-merger
8 years ago
Browse files
Options
Downloads
Plain Diff
profman/debuggerd: allow libart_file:file r_file_perms am:
364fd197
am:
d62abbee
am:
ff6715f3
am:
c9d0e1e9
Change-Id: I1dcb7093b6a770cf2ff1f124d9092b79a8d34d58
parents
d15db774
c9d0e1e9
No related branches found
No related tags found
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
public/debuggerd.te
+1
-1
1 addition, 1 deletion
public/debuggerd.te
public/domain.te
+2
-0
2 additions, 0 deletions
public/domain.te
public/profman.te
+6
-0
6 additions, 0 deletions
public/profman.te
with
9 additions
and
1 deletion
public/debuggerd.te
+
1
−
1
View file @
16b4b927
...
@@ -23,7 +23,7 @@ allow debuggerd tombstone_data_file:file create_file_perms;
...
@@ -23,7 +23,7 @@ allow debuggerd tombstone_data_file:file create_file_perms;
allow debuggerd shared_relro_file:dir r_dir_perms;
allow debuggerd shared_relro_file:dir r_dir_perms;
allow debuggerd shared_relro_file:file r_file_perms;
allow debuggerd shared_relro_file:file r_file_perms;
allow debuggerd domain:process { sigstop sigkill signal };
allow debuggerd domain:process { sigstop sigkill signal };
allow debuggerd exec_type:file r_file_perms;
allow debuggerd
{
exec_type
libart_file }
:file r_file_perms;
# Access app library
# Access app library
allow debuggerd system_data_file:file open;
allow debuggerd system_data_file:file open;
# Allow debuggerd to redirect a dump_backtrace request to itself.
# Allow debuggerd to redirect a dump_backtrace request to itself.
...
...
This diff is collapsed.
Click to expand it.
public/domain.te
+
2
−
0
View file @
16b4b927
...
@@ -107,8 +107,10 @@ allow domain libart_file:file { execute read open getattr };
...
@@ -107,8 +107,10 @@ allow domain libart_file:file { execute read open getattr };
auditallow {
auditallow {
domain
domain
-appdomain
-appdomain
-debuggerd
-dex2oat
-dex2oat
-dumpstate
-dumpstate
-profman
-recovery
-recovery
-zygote
-zygote
} libart_file:file { execute read open getattr };
} libart_file:file { execute read open getattr };
...
...
This diff is collapsed.
Click to expand it.
public/profman.te
+
6
−
0
View file @
16b4b927
...
@@ -2,6 +2,8 @@
...
@@ -2,6 +2,8 @@
type profman, domain;
type profman, domain;
type profman_exec, exec_type, file_type;
type profman_exec, exec_type, file_type;
allow profman libart_file:file r_file_perms;
allow profman user_profile_data_file:file { getattr read write lock };
allow profman user_profile_data_file:file { getattr read write lock };
# Dumping profile info opens the application APK file for pretty printing.
# Dumping profile info opens the application APK file for pretty printing.
...
@@ -14,4 +16,8 @@ allow profman profman_dump_data_file:file { write };
...
@@ -14,4 +16,8 @@ allow profman profman_dump_data_file:file { write };
allow profman installd:fd use;
allow profman installd:fd use;
###
### neverallow rules
###
neverallow profman app_data_file:notdevfile_class_set open;
neverallow profman app_data_file:notdevfile_class_set open;
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment