Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
436be431
Commit
436be431
authored
9 years ago
by
Yasuhiro Matsuda
Committed by
Android Git Automerger
9 years ago
Browse files
Options
Downloads
Plain Diff
am
3d328179
: Add SELinux settings to support tracing during boot.
* commit '
3d328179
': Add SELinux settings to support tracing during boot.
parents
403ff04c
3d328179
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
atrace.te
+24
-0
24 additions, 0 deletions
atrace.te
file.te
+1
-0
1 addition, 0 deletions
file.te
file_contexts
+2
-0
2 additions, 0 deletions
file_contexts
property.te
+1
-0
1 addition, 0 deletions
property.te
property_contexts
+1
-0
1 addition, 0 deletions
property_contexts
shell.te
+8
-0
8 additions, 0 deletions
shell.te
with
37 additions
and
0 deletions
atrace.te
0 → 100644
+
24
−
0
View file @
436be431
# Domain for atrace process spawned by boottrace service.
type atrace_exec, exec_type, file_type;
userdebug_or_eng(`
type atrace, domain;
init_daemon_domain(atrace)
# boottrace services uses /data/misc/boottrace/categories
allow atrace boottrace_data_file:dir search;
allow atrace boottrace_data_file:file r_file_perms;
# atrace reads the files in /sys/kernel/debug/tracing/
allow atrace debugfs:file r_file_perms;
# atrace sets debug.atrace.* properties
set_prop(atrace, debug_prop)
# atrace pokes all the binder-enabled processes at startup.
binder_use(atrace)
allow atrace healthd:binder call;
allow atrace surfaceflinger:binder call;
')
This diff is collapsed.
Click to expand it.
file.te
+
1
−
0
View file @
436be431
...
...
@@ -106,6 +106,7 @@ type storage_stub_file, file_type;
type adb_keys_file, file_type, data_file_type;
type audio_data_file, file_type, data_file_type;
type bluetooth_data_file, file_type, data_file_type;
type boottrace_data_file, file_type, data_file_type;
type camera_data_file, file_type, data_file_type;
type gatekeeper_data_file, file_type, data_file_type;
type keychain_data_file, file_type, data_file_type;
...
...
This diff is collapsed.
Click to expand it.
file_contexts
+
2
−
0
View file @
436be431
...
...
@@ -142,6 +142,7 @@
# System files
#
/system(/.*)? u:object_r:system_file:s0
/system/bin/atrace u:object_r:atrace_exec:s0
/system/bin/e2fsck -- u:object_r:fsck_exec:s0
/system/bin/fsck\.f2fs -- u:object_r:fsck_exec:s0
/system/bin/fsck_msdos -- u:object_r:fsck_exec:s0
...
...
@@ -245,6 +246,7 @@
# Misc data
/data/misc/adb(/.*)? u:object_r:adb_keys_file:s0
/data/misc/audio(/.*)? u:object_r:audio_data_file:s0
/data/misc/boottrace(/.*)? u:object_r:boottrace_data_file:s0
/data/misc/bluetooth(/.*)? u:object_r:bluetooth_data_file:s0
/data/misc/bluedroid(/.*)? u:object_r:bluetooth_data_file:s0
/data/misc/bluedroid/\.a2dp_ctrl u:object_r:bluetooth_socket:s0
...
...
This diff is collapsed.
Click to expand it.
property.te
+
1
−
0
View file @
436be431
type default_prop, property_type;
type shell_prop, property_type;
type debug_prop, property_type;
type persist_debug_prop, property_type;
type debuggerd_prop, property_type;
type dhcp_prop, property_type;
type fingerprint_prop, property_type;
...
...
This diff is collapsed.
Click to expand it.
property_contexts
+
1
−
0
View file @
436be431
...
...
@@ -34,6 +34,7 @@ service.adb.root u:object_r:shell_prop:s0
service.adb.tcp.port u:object_r:shell_prop:s0
persist.audio. u:object_r:audio_prop:s0
persist.debug. u:object_r:persist_debug_prop:s0
persist.logd. u:object_r:logd_prop:s0
persist.sys. u:object_r:system_prop:s0
persist.service. u:object_r:system_prop:s0
...
...
This diff is collapsed.
Click to expand it.
shell.te
+
8
−
0
View file @
436be431
...
...
@@ -55,6 +55,14 @@ set_prop(shell, powerctl_prop)
# Directory read access and file write access is already granted
# in domain.te.
allow shell debugfs:file r_file_perms;
allow shell atrace_exec:file rx_file_perms;
userdebug_or_eng(`
# "systrace --boot" support - allow boottrace service to run
allow shell boottrace_data_file:dir rw_dir_perms;
allow shell boottrace_data_file:file create_file_perms;
set_prop(shell, persist_debug_prop)
')
# allow shell to run dmesg
allow shell kernel:system syslog_read;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment