gxp_logging service will periodically check the sysfs files exposed by the gxp kernel driver and report stats to Suez framework. These policies are needed to report the metrics. Tested: Found no violation with these policies on a P23 device Bug: 278514198 Change-Id: I8c3e57dfe4e9a6caab425f2424d07e83f5e7b9c6 Signed-off-by: Dinesh Yadav <dkyadav@google.com>
22 lines
745 B
Text
22 lines
745 B
Text
type gxp_logging, domain;
|
|
type gxp_logging_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(gxp_logging)
|
|
|
|
# The logging service accesses /dev/gxp
|
|
allow gxp_logging gxp_device:chr_file rw_file_perms;
|
|
|
|
# Allow logging service to access /sys/class/gxp
|
|
allow gxp_logging sysfs_gxp:dir search;
|
|
allow gxp_logging sysfs_gxp:file rw_file_perms;
|
|
|
|
# Allow logging service to log to stats service for reporting metrics.
|
|
allow gxp_logging fwk_stats_service:service_manager find;
|
|
binder_call(gxp_logging, system_server);
|
|
binder_use(gxp_logging)
|
|
|
|
# Allow logging service to read gxp properties.
|
|
get_prop(gxp_logging, vendor_gxp_prop)
|
|
|
|
# Allow gxp tracing service to send packets to Perfetto
|
|
userdebug_or_eng(`perfetto_producer(gxp_logging)')
|
|
|