Skip to content
Snippets Groups Projects
Commit cbd85e53 authored by Primiano Tucci's avatar Primiano Tucci Committed by Gerrit Code Review
Browse files

Merge "Revert "perfetto: allow traced_probes to execute atrace""

parents 3538fc3d 70f8f329
No related branches found
No related tags found
No related merge requests found
...@@ -35,27 +35,6 @@ allow traced_probes kmsg_device:chr_file write; ...@@ -35,27 +35,6 @@ allow traced_probes kmsg_device:chr_file write;
# Allow traced_probes to list the system partition. # Allow traced_probes to list the system partition.
allow traced_probes system_file:dir { open read }; allow traced_probes system_file:dir { open read };
# ----- Begin of policies for exec(atrace) -----
# Allow traced_probes to run atrace. atrace pokes at system services to enable
# their userspace TRACE macros.
allow traced_probes atrace_exec:file rx_file_perms;
# This is needed for: path="/system/bin/linker64"
# scontext=u:r:atrace:s0 tcontext=u:r:traced_probes:s0 tclass=fd
allow atrace traced_probes:fd use;
# atrace sets debug.atrace.* properties to tell services to enable their
# userspace tracing.
set_prop(traced_probes, debug_prop)
# And then sends them an IPC to tell them to re-read that property.
binder_use(traced_probes)
allow traced_probes healthd:binder call;
allow traced_probes surfaceflinger:binder call;
get_prop(traced_probes, hwservicemanager_prop)
# ----- End of policies for exec(atrace) -----
### ###
### Neverallow rules ### Neverallow rules
### ###
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment