Merge "Add TCP dump permissions." into sc-dev
This commit is contained in:
commit
5bbdd82a4e
6 changed files with 35 additions and 0 deletions
3
whitechapel/vendor/google/file.te
vendored
3
whitechapel/vendor/google/file.te
vendored
|
@ -118,6 +118,9 @@ type persist_modem_file, file_type, vendor_persist_type;
|
|||
type modem_img_file, contextmount_type, file_type, vendor_file_type;
|
||||
allow modem_img_file self:filesystem associate;
|
||||
|
||||
# TCP logging
|
||||
type tcpdump_vendor_data_file, file_type, data_file_type, mlstrustedobject;
|
||||
|
||||
# Wireless
|
||||
type sysfs_wlc, sysfs_type, fs_type;
|
||||
|
||||
|
|
4
whitechapel/vendor/google/file_contexts
vendored
4
whitechapel/vendor/google/file_contexts
vendored
|
@ -254,6 +254,10 @@
|
|||
# Modem logging
|
||||
/vendor/bin/modem_logging_control u:object_r:modem_logging_control_exec:s0
|
||||
|
||||
# TCP logging
|
||||
/vendor/bin/tcpdump_logger u:object_r:tcpdump_logger_exec:s0
|
||||
/data/vendor/tcpdump_logger(/.*)? u:object_r:tcpdump_vendor_data_file:s0
|
||||
|
||||
# Audio logging
|
||||
/vendor/bin/aocdump u:object_r:aocdump_exec:s0
|
||||
|
||||
|
|
1
whitechapel/vendor/google/logger_app.te
vendored
1
whitechapel/vendor/google/logger_app.te
vendored
|
@ -16,4 +16,5 @@ userdebug_or_eng(`
|
|||
set_prop(logger_app, vendor_modem_prop)
|
||||
set_prop(logger_app, vendor_gps_prop)
|
||||
set_prop(logger_app, vendor_audio_prop)
|
||||
set_prop(logger_app, vendor_tcpdump_log_prop)
|
||||
')
|
||||
|
|
3
whitechapel/vendor/google/property.te
vendored
3
whitechapel/vendor/google/property.te
vendored
|
@ -44,3 +44,6 @@ vendor_internal_prop(vendor_wifi_version)
|
|||
|
||||
# Touchpanel
|
||||
vendor_internal_prop(vendor_touchpanel_prop)
|
||||
|
||||
# TCP logging
|
||||
vendor_internal_prop(vendor_tcpdump_log_prop)
|
6
whitechapel/vendor/google/property_contexts
vendored
6
whitechapel/vendor/google/property_contexts
vendored
|
@ -105,3 +105,9 @@ vendor.wlan.firmware.version u:object_r:vendor_wifi_version:s
|
|||
|
||||
# Touchpanel
|
||||
vendor.mfgapi.touchpanel.permission u:object_r:vendor_touchpanel_prop:s0
|
||||
|
||||
# Tcpdump_logger
|
||||
persist.vendor.tcpdump.log.alwayson u:object_r:vendor_tcpdump_log_prop:s0
|
||||
vendor.tcpdump.log.ondemand u:object_r:vendor_tcpdump_log_prop:s0
|
||||
vendor.tcpdump.log.alwayson u:object_r:vendor_tcpdump_log_prop:s0
|
||||
vendor.tcpdump.output.dir u:object_r:vendor_tcpdump_log_prop:s0
|
18
whitechapel/vendor/google/tcpdump_logger.te
vendored
Normal file
18
whitechapel/vendor/google/tcpdump_logger.te
vendored
Normal file
|
@ -0,0 +1,18 @@
|
|||
type tcpdump_logger, domain;
|
||||
type tcpdump_logger_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
userdebug_or_eng(`
|
||||
# make transition from init to its domain
|
||||
init_daemon_domain(tcpdump_logger)
|
||||
|
||||
allow tcpdump_logger self:capability net_raw;
|
||||
allow tcpdump_logger self:packet_socket create_socket_perms;
|
||||
allowxperm tcpdump_logger self:packet_socket ioctl 0x8933;
|
||||
allow tcpdump_logger tcpdump_exec:file rx_file_perms;
|
||||
allow tcpdump_logger tcpdump_vendor_data_file:dir create_dir_perms;
|
||||
allow tcpdump_logger tcpdump_vendor_data_file:file create_file_perms;
|
||||
allow tcpdump_logger radio_vendor_data_file:file create_file_perms;
|
||||
allow tcpdump_logger radio_vendor_data_file:dir create_dir_perms;
|
||||
|
||||
set_prop(tcpdump_logger, vendor_tcpdump_log_prop)
|
||||
')
|
Loading…
Add table
Add a link
Reference in a new issue