Skip to content
Snippets Groups Projects
Commit de04528c authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by Carmen Jackson
Browse files

Enable Traceur on user builds.

Test: Standard Traceur workflow works successfully with no
selinux denials on a user build.
Bug: 64762598
Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
parent 4ca98248
Branches
Tags
No related merge requests found
...@@ -60,7 +60,7 @@ full_treble_only(` ...@@ -60,7 +60,7 @@ full_treble_only(`
userdebug_or_eng(`-perfprofd') userdebug_or_eng(`-perfprofd')
userdebug_or_eng(`-traced_probes') userdebug_or_eng(`-traced_probes')
-shell -shell
userdebug_or_eng(`-traceur_app') -traceur_app
} debugfs_tracing:file no_rw_file_perms; } debugfs_tracing:file no_rw_file_perms;
# inotifyfs # inotifyfs
......
...@@ -86,7 +86,7 @@ neverallow { ...@@ -86,7 +86,7 @@ neverallow {
-statsd -statsd
-system_app -system_app
-system_server -system_server
userdebug_or_eng(`-traceur_app') -traceur_app
} stats_service:service_manager find; } stats_service:service_manager find;
# Only statsd and the other root services in limited circumstances. # Only statsd and the other root services in limited circumstances.
......
typeattribute traceur_app coredomain; typeattribute traceur_app coredomain;
userdebug_or_eng(`
app_domain(traceur_app); app_domain(traceur_app);
allow traceur_app debugfs_tracing:file rw_file_perms; allow traceur_app debugfs_tracing:file rw_file_perms;
userdebug_or_eng(`
allow traceur_app debugfs_tracing_debug:file rw_file_perms; allow traceur_app debugfs_tracing_debug:file rw_file_perms;
')
allow traceur_app trace_data_file:file create_file_perms; allow traceur_app trace_data_file:file create_file_perms;
allow traceur_app trace_data_file:dir { add_name getattr search write }; allow traceur_app trace_data_file:dir { add_name getattr search write };
allow traceur_app atrace_exec:file rx_file_perms; allow traceur_app atrace_exec:file rx_file_perms;
')
...@@ -283,6 +283,6 @@ neverallow { ...@@ -283,6 +283,6 @@ neverallow {
domain domain
-system_server -system_server
-shell -shell
userdebug_or_eng(`-traceur_app') -traceur_app
-dumpstate -dumpstate
} dumpstate_service:service_manager find; } dumpstate_service:service_manager find;
type traceur_app, domain; type traceur_app, domain;
userdebug_or_eng(`
allow traceur_app servicemanager:service_manager list; allow traceur_app servicemanager:service_manager list;
allow traceur_app hwservicemanager:hwservice_manager list; allow traceur_app hwservicemanager:hwservice_manager list;
...@@ -20,4 +19,3 @@ userdebug_or_eng(` ...@@ -20,4 +19,3 @@ userdebug_or_eng(`
dontaudit traceur_app service_manager_type:service_manager find; dontaudit traceur_app service_manager_type:service_manager find;
dontaudit traceur_app hwservice_manager_type:hwservice_manager find; dontaudit traceur_app hwservice_manager_type:hwservice_manager find;
dontaudit traceur_app domain:binder call; dontaudit traceur_app domain:binder call;
')
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment