Add /dev/kmsg_debug.
Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
crashes to dmesg when logd isn't up yet (or is the one crashing).
(Originally commited in a015186fab
)
Bug: 36574794
Bug: 62101480
Test: Builds and boots.
Change-Id: I249e11291c58fee77098dec3fd3271ea23363ac9
This commit is contained in:
parent
2d1927595e
commit
3458ec135e
5 changed files with 14 additions and 0 deletions
5
prebuilts/api/26.0/26.0.ignore.cil
Normal file
5
prebuilts/api/26.0/26.0.ignore.cil
Normal file
|
@ -0,0 +1,5 @@
|
|||
;; new_objects - a collection of types that have been introduced that have no
|
||||
;; analogue in older policy. Thus, we do not need to map these types to
|
||||
;; previous ones. Add here to pass checkapi tests.
|
||||
(typeattribute new_objects)
|
||||
(typeattributeset new_objects (kmsg_debug_device))
|
|
@ -107,6 +107,7 @@
|
|||
/dev/ptmx u:object_r:ptmx_device:s0
|
||||
/dev/pvrsrvkm u:object_r:gpu_device:s0
|
||||
/dev/kmsg u:object_r:kmsg_device:s0
|
||||
/dev/kmsg_debug u:object_r:kmsg_debug_device:s0
|
||||
/dev/null u:object_r:null_device:s0
|
||||
/dev/nvhdcp1 u:object_r:video_device:s0
|
||||
/dev/random u:object_r:random_device:s0
|
||||
|
|
|
@ -15,6 +15,9 @@ dontaudit crash_dump self:capability { sys_ptrace };
|
|||
|
||||
userdebug_or_eng(`
|
||||
allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
|
||||
|
||||
# Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up.
|
||||
allow crash_dump kmsg_debug_device:chr_file { open append };
|
||||
')
|
||||
|
||||
# Use inherited file descriptors
|
||||
|
|
|
@ -37,6 +37,7 @@ type mtp_device, dev_type, mlstrustedobject;
|
|||
type nfc_device, dev_type;
|
||||
type ptmx_device, dev_type, mlstrustedobject;
|
||||
type kmsg_device, dev_type;
|
||||
type kmsg_debug_device, dev_type;
|
||||
type null_device, dev_type, mlstrustedobject;
|
||||
type random_device, dev_type, mlstrustedobject;
|
||||
type sensors_device, dev_type;
|
||||
|
|
|
@ -13,6 +13,10 @@ allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
|
|||
# /dev/kmsg
|
||||
allow init tmpfs:chr_file relabelfrom;
|
||||
allow init kmsg_device:chr_file { write relabelto };
|
||||
# /dev/kmsg_debug
|
||||
userdebug_or_eng(`
|
||||
allow init kmsg_debug_device:chr_file { write relabelto };
|
||||
')
|
||||
# /dev/__properties__
|
||||
allow init properties_device:dir relabelto;
|
||||
allow init properties_serial:file { write relabelto };
|
||||
|
|
Loading…
Reference in a new issue