- Dec 11, 2018
-
-
Benjamin Schwartz authored
Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP. Bug: 111185513 Bug: 120551881 Test: make Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
-
- Oct 08, 2018
-
-
Howard Ro authored
We plan on migrating MetricsLogger to write to statsd socket. So we need to allow zygote, which writes to logd using MetricsLogger, to also be able to statsd. We also re-locate some sepolicies to write to statsd socket in their respective policy definitions. Bug: 110537511 Test: no failure/violations observed Change-Id: I21fd352a25ed946516f9a45ac3b5e9bf97b059bc
-
- Sep 28, 2018
-
-
Howard Ro authored
Bug: 116732452 Test: No sepolicy violations observed with this change (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb) Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
-
- Sep 27, 2018
-
-
Nick Kralevich authored
system_file_type is a new attribute used to identify files which exist on the /system partition. It's useful for allow rules in init, which are based off of a blacklist of writable files. Additionally, it's useful for constructing neverallow rules to prevent regressions. Additionally, add commented out tests which enforce that all files on the /system partition have the system_file_type attribute. These tests will be uncommented in a future change after all the device-specific policies are cleaned up. Test: Device boots and no obvious problems. Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
-
- Aug 23, 2018
-
-
Howard Ro authored
Also move statsd to /public/ Bug: 110538431 Test: manual testing Change-Id: I58319e169eaab7d997ed3628c3c9709cf7bd0d4a
-
- May 10, 2018
-
-
Andreas Gampe authored
Let statsd find the service. The system server wants to read file attributes for the perfprofd dropbox file. Bug: 73175642 Test: m Test: manual Change-Id: I0c0b1dac057af90fff440286226093ec15b5e247
-
- May 03, 2018
- Apr 25, 2018
-
-
yro authored
Test: manual Bug: 78318738 Change-Id: I45c3511860fbe6a1de45c6930052a8865b38986a
-
- Apr 23, 2018
-
-
yro authored
The corresponding change in aosp is made at aosp/669146 Violation: 04-23 10:51:03.926 2103 2103 W m.android.phone: type=1400 audit(0.0:8): avc: denied { write } for name="statsdw" dev="tmpfs" ino=22538 scontext=u:r:radio:s0 tcontext=u:object_r:statsdw_socket:s0 tclass=sock_file permissive=0 Bug: 78318738 Test: manual Change-Id: I8aa70b07281df8a732f2f99d4d323961e425feea
-
- Apr 20, 2018
-
-
yro authored
Test: manual Bug: 78318738 Change-Id: Ifa1cbbfdbb5acb713dfeb1d4bf98d1e116e5a89b
-
- Apr 17, 2018
-
-
Bookatz authored
Statsd sepolicy hal_health Statsd monitors battery capacity, which requires calls to the health hal. Fixes: 77923174 Bug: 77916472 Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests#testFullBatteryCapacity Merged-In: I2d6685d4b91d8fbc7422dfdd0b6ed96bbddc0886 Change-Id: I767068c60cff6c1baba615d89186705107531c02
-
- Apr 12, 2018
-
-
Bookatz authored
Statsd monitors battery capacity, which requires calls to the health hal. Fixes: 77923174 Bug: 77916472 Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests#testFullBatteryCapacity Change-Id: I2d6685d4b91d8fbc7422dfdd0b6ed96bbddc0886
-
- Mar 31, 2018
-
-
yro authored
Bug: 75968642 Test: manual testing to check for sepolicy violation Cherry-picked from aosp/652222 Change-Id: Idc83669feaf9fd17bed26f89dfce33e3f2f5424f
-
- Mar 30, 2018
-
-
yro authored
Test: manually tested to prevent sepolicy violation Change-Id: I9ebcc86464a9fc61a49d5c9be40f19f3523b6785
-
- Mar 28, 2018
-
-
Andreas Gampe authored
Give statsd rights to connect to perfprofd in userdebug. (cherry picked from commit 488030ee) Bug: 73175642 Test: mmma system/extras/perfprofd Merged-In: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
-
- Mar 27, 2018
-
-
Andreas Gampe authored
Give statsd rights to connect to perfprofd in userdebug. Test: mmma system/extras/perfprofd Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
-
- Feb 27, 2018
-
-
Tej Singh authored
Updates statsd sepolicy so it can use the thermal hal. Test: verified these policies solved sepolicy issues with thermal hal. Change-Id: I36839a72494b084d5742c4d83c3ce9814102b974
-
- Feb 23, 2018
-
-
Bookatz authored
These two selinux policy violations keep showing up from statsd's CTS tests, although statsd and the CTS test seemed to function fine despite them. Nonetheless, they seem reasonable to add to the list. Bug: 73548694 Test: N/A. It didn't seem to be causing any issues in the first place. Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
-
- Feb 16, 2018
-
-
Bookatz authored
To upload configs and download output, this line is needed. Bug: 72961153 Test: The statsd cts test passes Change-Id: I0943cc841881dd5d15e24ba444b146087a81bf96
-
- Feb 13, 2018
-
-
Bookatz authored
CTS tests need to be able to call, from hostside: adb shell cmd stats dump-report (and others) On a user build, this will fail because of an selinux policy violation from shell. This cl fixes this by granting shell permission. Similarly, Settings needs to communicate with statsd, so system_app-statsd binder calls are given permission. Bug: 72961153 Bug: 73255014 Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests Test: manual confirmation Change-Id: I6589ab4ef5c91a4a7f78eb97b63d9bb43e3d8f02
-
- Feb 02, 2018
-
-
Jeff Vander Stoep authored
Test: Standard Traceur workflow works successfully with no selinux denials on a user build. Bug: 64762598 Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
-
- Jan 29, 2018
-
-
Primiano Tucci authored
Instead of having statsd linking the perfetto client library and talk directly to its socket, we let just statsd exec() the /system/bin/perfetto cmdline client. There are two reasons for this: 1) Simplify the interaction between statsd and perfetto, reduce dependencies, binary size bloat and isolate faults. 2) The cmdline client also takes care of handing the trace to Dropbox. This allows to expose the binder interaction surface to the short-lived cmdline client and avoid to grant binder access to the perfetto traced daemon. This cmdline client will be used by: - statsd - the shell user (for our UI and Studio) Bug: 70942310 Change-Id: I8cdde181481ad0a1a5cae5937ac446cedac54a1f
-
- Jan 25, 2018
-
-
Tom Cherry authored
The exception for vendor_init in this neverallow was never needed. Bug: 62875318 Test: Build walleye, bullhead Change-Id: Iac2b57df30b376492851d7520994e0400a87f1e1
-
- Jan 24, 2018
- Jan 19, 2018
-
-
Yao Chen authored
Selinux violations while calling dump() on statsd by bugreport. avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1 denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1 avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 Test: manual Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
-
- Jan 10, 2018
-
-
yro authored
and pulling metrics Bug: 63757906 Test: manual testing conducted Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
-
Primiano Tucci authored
Perfetto is a performance instrumentation and logging framework, living in AOSP's /external/pefetto. Perfetto introduces in the system one binary and two daemons (the binary can specialize in either depending on the cmdline). 1) traced: unprivileged daemon. This is architecturally similar to logd. It exposes two UNIX sockets: - /dev/socket/traced_producer : world-accessible, allows to stream tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS from traced to each client process, which needs to be able to mmap it R/W (but not X) - /dev/socket/traced_consumer : privilege-accessible (only from: shell, statsd). It allows to configure tracing and read the trace buffer. 2) traced_probes: privileged daemon. This needs to: - access tracingfs (/d/tracing) to turn tracing on and off. - exec atrace - connect to traced_producer to stream data to traced. init.rc file: https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc Bug: 70942310 Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
-
- Jan 09, 2018
-
-
yro authored
communicate with statsd Test: manual testing conducted Change-Id: Icd268e258f7cbdd9310baab53fe0c66f4f303d5e
-
- Jan 02, 2018
-
-
Max Bires authored
This CL creates a traceur_app domain with userdebug privileges akin to what shell has with regards to being able to find most services on device. Previously, traceur was running as shell which was an unintentional abuse of selinux architecture. Bug: 68126425 Test: Traceur functions outside of shell user privilege Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
-
- Dec 19, 2017
-
-
yro authored
Bug: 63757906 Test: manual testing conducted Change-Id: Id03413ce82b5646d4bceddc59e16c7d5ee5bc193
-
- Dec 16, 2017
-
-
yro authored
Test: manual testing conducted see if it interfere's with AOSP Change-Id: If47a663557b2ebf825fc082edb838ae085ec66b3