Skip to content
Snippets Groups Projects
Commit 941cc9c8 authored by TreeHugger Robot's avatar TreeHugger Robot Committed by Android (Google) Code Review
Browse files

Merge "Allow incidentd to read LAST_KMSG only for userdebug builds" into pi-dev

parents c2e249dd 4f69d912
No related branches found
No related tags found
No related merge requests found
...@@ -83,6 +83,7 @@ full_treble_only(` ...@@ -83,6 +83,7 @@ full_treble_only(`
-charger -charger
-dumpstate -dumpstate
-healthd -healthd
userdebug_or_eng(`-incidentd')
-init -init
-logd -logd
-logpersist -logpersist
......
...@@ -8,6 +8,7 @@ domain_auto_trans(incidentd, incident_helper_exec, incident_helper) ...@@ -8,6 +8,7 @@ domain_auto_trans(incidentd, incident_helper_exec, incident_helper)
# use pipe to transmit data from/to incidentd/incident_helper for parsing # use pipe to transmit data from/to incidentd/incident_helper for parsing
allow incident_helper { shell incident incidentd }:fd use; allow incident_helper { shell incident incidentd }:fd use;
allow incident_helper { shell incident incidentd }:fifo_file { getattr read write }; allow incident_helper { shell incident incidentd }:fifo_file { getattr read write };
allow incident_helper incidentd:unix_stream_socket { read write };
# only allow incidentd and shell to call incident_helper # only allow incidentd and shell to call incident_helper
neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execute_no_trans }; neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execute_no_trans };
...@@ -38,6 +38,10 @@ allow incidentd domain:process getattr; ...@@ -38,6 +38,10 @@ allow incidentd domain:process getattr;
allow incidentd sysfs_batteryinfo:dir { search }; allow incidentd sysfs_batteryinfo:dir { search };
allow incidentd sysfs_batteryinfo:file r_file_perms; allow incidentd sysfs_batteryinfo:file r_file_perms;
# section id 2007, allow reading LAST_KMSG /sys/fs/pstore/console-ramoops
userdebug_or_eng(`allow incidentd pstorefs:dir search');
userdebug_or_eng(`allow incidentd pstorefs:file r_file_perms');
# Create and write into /data/misc/incidents # Create and write into /data/misc/incidents
allow incidentd incident_data_file:dir rw_dir_perms; allow incidentd incident_data_file:dir rw_dir_perms;
allow incidentd incident_data_file:file create_file_perms; allow incidentd incident_data_file:file create_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment