5cc16d4a58
persist.traced.enable is now set in base_system.mk, this CL cleans up the SELinux permissions Traceur needed to enable the property. Bug: 130784724 Test: Built and ran successfully. Change-Id: Id2262a7f235fba60785cc0cff20966200d54d04a
24 lines
782 B
Text
24 lines
782 B
Text
typeattribute traceur_app coredomain;
|
|
|
|
app_domain(traceur_app);
|
|
allow traceur_app debugfs_tracing:file rw_file_perms;
|
|
allow traceur_app debugfs_tracing_debug:dir r_dir_perms;
|
|
|
|
userdebug_or_eng(`
|
|
allow traceur_app debugfs_tracing_debug:file rw_file_perms;
|
|
')
|
|
|
|
allow traceur_app trace_data_file:file create_file_perms;
|
|
allow traceur_app trace_data_file:dir rw_dir_perms;
|
|
allow traceur_app atrace_exec:file rx_file_perms;
|
|
|
|
# To exec the perfetto cmdline client and pass it the trace config on
|
|
# stdint through a pipe.
|
|
allow traceur_app perfetto_exec:file rx_file_perms;
|
|
|
|
# Allow to access traced's privileged consumer socket.
|
|
unix_socket_connect(traceur_app, traced_consumer, traced)
|
|
|
|
dontaudit traceur_app debugfs_tracing_debug:file audit_access;
|
|
|
|
set_prop(traceur_app, debug_prop)
|