Skip to content
Snippets Groups Projects
Commit 2f39276e authored by Treehugger Robot's avatar Treehugger Robot Committed by Gerrit Code Review
Browse files

Merge "Sepolicy: Introduce perfprofd binder service"

parents 8d07a8d5 aa9711f8
No related branches found
No related tags found
No related merge requests found
...@@ -27,6 +27,7 @@ ...@@ -27,6 +27,7 @@
netd_stable_secret_prop netd_stable_secret_prop
network_watchlist_service network_watchlist_service
package_native_service package_native_service
perfprofd_service
property_info property_info
slice_service slice_service
stats stats
......
...@@ -111,6 +111,7 @@ otadexopt u:object_r:otadexopt_service:s0 ...@@ -111,6 +111,7 @@ otadexopt u:object_r:otadexopt_service:s0
overlay u:object_r:overlay_service:s0 overlay u:object_r:overlay_service:s0
package u:object_r:package_service:s0 package u:object_r:package_service:s0
package_native u:object_r:package_native_service:s0 package_native u:object_r:package_native_service:s0
perfprofd u:object_r:perfprofd_service:s0
permission u:object_r:permission_service:s0 permission u:object_r:permission_service:s0
persistent_data_block u:object_r:persistent_data_block_service:s0 persistent_data_block u:object_r:persistent_data_block_service:s0
phone_msim u:object_r:radio_service:s0 phone_msim u:object_r:radio_service:s0
......
...@@ -96,4 +96,22 @@ userdebug_or_eng(` ...@@ -96,4 +96,22 @@ userdebug_or_eng(`
dontaudit perfprofd shell_data_file:dir *; dontaudit perfprofd shell_data_file:dir *;
dontaudit perfprofd shell_data_file:file *; dontaudit perfprofd shell_data_file:file *;
# Allow perfprofd to publish a binder service and make binder calls.
binder_use(perfprofd)
add_service(perfprofd, perfprofd_service)
# Use devpts for streams from cmd.
#
# This is normally granted to binderservicedomain, but this service
# has tighter restrictions on the callers (see below), so must enable
# this manually.
allow perfprofd devpts:chr_file rw_file_perms;
# Use socket & pipe supplied by su, for cmd perfprofd dump.
allow perfprofd su:unix_stream_socket { read write getattr sendto };
allow perfprofd su:fifo_file r_file_perms;
# For now, only allow su to communicate with us.
neverallow domain perfprofd:binder call;
neverallow perfprofd { domain -servicemanager -su }:binder call;
') ')
...@@ -20,6 +20,7 @@ type mediacodec_service, service_manager_type; ...@@ -20,6 +20,7 @@ type mediacodec_service, service_manager_type;
type mediadrmserver_service, service_manager_type; type mediadrmserver_service, service_manager_type;
type netd_service, service_manager_type; type netd_service, service_manager_type;
type nfc_service, service_manager_type; type nfc_service, service_manager_type;
type perfprofd_service, service_manager_type;
type radio_service, service_manager_type; type radio_service, service_manager_type;
type storaged_service, service_manager_type; type storaged_service, service_manager_type;
type surfaceflinger_service, app_api_service, ephemeral_app_api_service, service_manager_type; type surfaceflinger_service, app_api_service, ephemeral_app_api_service, service_manager_type;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment