Skip to content
Snippets Groups Projects
Commit 2c5c57e2 authored by Primiano Tucci's avatar Primiano Tucci Committed by android-build-merger
Browse files

Merge "perfetto: allow traced_probes to execute atrace" am: 3538fc3d am: c547dcb8

am: 097ff093

Change-Id: Iddc4f025032b54b77085ec00c47a09786cb9ce76
parents dc7925d4 097ff093
No related branches found
No related tags found
No related merge requests found
......@@ -35,6 +35,27 @@ allow traced_probes kmsg_device:chr_file write;
# Allow traced_probes to list the system partition.
allow traced_probes system_file:dir { open read };
# ----- Begin of policies for exec(atrace) -----
# Allow traced_probes to run atrace. atrace pokes at system services to enable
# their userspace TRACE macros.
allow traced_probes atrace_exec:file rx_file_perms;
# This is needed for: path="/system/bin/linker64"
# scontext=u:r:atrace:s0 tcontext=u:r:traced_probes:s0 tclass=fd
allow atrace traced_probes:fd use;
# atrace sets debug.atrace.* properties to tell services to enable their
# userspace tracing.
set_prop(traced_probes, debug_prop)
# And then sends them an IPC to tell them to re-read that property.
binder_use(traced_probes)
allow traced_probes healthd:binder call;
allow traced_probes surfaceflinger:binder call;
get_prop(traced_probes, hwservicemanager_prop)
# ----- End of policies for exec(atrace) -----
###
### Neverallow rules
###
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment