File tree 4 files changed +30
-0
lines changed
prebuilts/api/30.0/private
4 files changed +30
-0
lines changed Original file line number Diff line number Diff line change @@ -180,6 +180,11 @@ r_dir_file(adbd, apk_data_file)
180
180
181
181
allow adbd rootfs:dir r_dir_perms;
182
182
183
+ # Allow killing child "perfetto" binary processes, which auto-transition to
184
+ # their own domain. Allows propagating termination of "adb shell perfetto ..."
185
+ # invocations.
186
+ allow adbd perfetto:process signal;
187
+
183
188
# Allow to pull Perfetto traces.
184
189
allow adbd perfetto_traces_data_file:file r_file_perms;
185
190
allow adbd perfetto_traces_data_file:dir r_dir_perms;
Original file line number Diff line number Diff line change @@ -47,6 +47,16 @@ allow perfetto devpts:chr_file rw_file_perms;
47
47
allow perfetto incident_service:service_manager find;
48
48
binder_call(perfetto, incidentd)
49
49
50
+ # perfetto log formatter calls isatty() on its stderr. Denial when running
51
+ # under adbd is harmless. Avoid generating denial logs.
52
+ dontaudit perfetto adbd:unix_stream_socket getattr;
53
+ dontauditxperm perfetto adbd:unix_stream_socket ioctl unpriv_tty_ioctls;
54
+ # As above, when adbd is running in "su" domain (only the ioctl is denied in
55
+ # practice).
56
+ dontauditxperm perfetto su:unix_stream_socket ioctl unpriv_tty_ioctls;
57
+ # Similarly, CTS tests end up hitting a denial on shell pipes.
58
+ dontauditxperm perfetto shell:fifo_file ioctl unpriv_tty_ioctls;
59
+
50
60
# ##
51
61
# ## Neverallow rules
52
62
# ##
Original file line number Diff line number Diff line change @@ -180,6 +180,11 @@ r_dir_file(adbd, apk_data_file)
180
180
181
181
allow adbd rootfs:dir r_dir_perms;
182
182
183
+ # Allow killing child "perfetto" binary processes, which auto-transition to
184
+ # their own domain. Allows propagating termination of "adb shell perfetto ..."
185
+ # invocations.
186
+ allow adbd perfetto:process signal;
187
+
183
188
# Allow to pull Perfetto traces.
184
189
allow adbd perfetto_traces_data_file:file r_file_perms;
185
190
allow adbd perfetto_traces_data_file:dir r_dir_perms;
Original file line number Diff line number Diff line change @@ -47,6 +47,16 @@ allow perfetto devpts:chr_file rw_file_perms;
47
47
allow perfetto incident_service:service_manager find;
48
48
binder_call(perfetto, incidentd)
49
49
50
+ # perfetto log formatter calls isatty() on its stderr. Denial when running
51
+ # under adbd is harmless. Avoid generating denial logs.
52
+ dontaudit perfetto adbd:unix_stream_socket getattr;
53
+ dontauditxperm perfetto adbd:unix_stream_socket ioctl unpriv_tty_ioctls;
54
+ # As above, when adbd is running in "su" domain (only the ioctl is denied in
55
+ # practice).
56
+ dontauditxperm perfetto su:unix_stream_socket ioctl unpriv_tty_ioctls;
57
+ # Similarly, CTS tests end up hitting a denial on shell pipes.
58
+ dontauditxperm perfetto shell:fifo_file ioctl unpriv_tty_ioctls;
59
+
50
60
# ##
51
61
# ## Neverallow rules
52
62
# ##
You can’t perform that action at this time.
0 commit comments