Skip to content
Snippets Groups Projects
  1. Apr 17, 2018
    • Bookatz's avatar
      NO PARTIAL RERUN · 055a958d
      Bookatz authored
      Statsd sepolicy hal_health
      
      Statsd monitors battery capacity, which requires calls to the health
      hal.
      
      Fixes: 77923174
      Bug: 77916472
      Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests#testFullBatteryCapacity
      Merged-In: I2d6685d4b91d8fbc7422dfdd0b6ed96bbddc0886
      Change-Id: I767068c60cff6c1baba615d89186705107531c02
      055a958d
  2. Mar 31, 2018
  3. Mar 28, 2018
  4. Feb 27, 2018
    • Tej Singh's avatar
      Statsd sepolicy for thermal hal · c26ac738
      Tej Singh authored
      Updates statsd sepolicy so it can use the thermal hal.
      
      Test: verified these policies solved sepolicy issues with thermal hal.
      Change-Id: I36839a72494b084d5742c4d83c3ce9814102b974
      c26ac738
  5. Feb 23, 2018
    • Bookatz's avatar
      Fix benign statsd selinux violations · c9f205b5
      Bookatz authored
      These two selinux policy violations keep showing up from statsd's CTS
      tests, although statsd and the CTS test seemed to function fine despite
      them. Nonetheless, they seem reasonable to add to the list.
      
      Bug: 73548694
      Test: N/A. It didn't seem to be causing any issues in the first place.
      Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
      c9f205b5
  6. Feb 16, 2018
  7. Feb 13, 2018
    • Bookatz's avatar
      Statsd allow shell in selinux policy · 022ab0e7
      Bookatz authored
      CTS tests need to be able to call, from hostside:
      adb shell cmd stats dump-report (and others)
      On a user build, this will fail because of an selinux policy violation
      from shell. This cl fixes this by granting shell permission.
      
      Similarly, Settings needs to communicate with statsd, so
      system_app-statsd binder calls are given permission.
      
      Bug: 72961153
      Bug: 73255014
      Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests
      Test: manual confirmation
      Change-Id: I6589ab4ef5c91a4a7f78eb97b63d9bb43e3d8f02
      022ab0e7
  8. Feb 02, 2018
    • Jeff Vander Stoep's avatar
      Enable Traceur on user builds. · de04528c
      Jeff Vander Stoep authored
      Test: Standard Traceur workflow works successfully with no
      selinux denials on a user build.
      Bug: 64762598
      Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
      de04528c
  9. Jan 29, 2018
    • Primiano Tucci's avatar
      SELinux policies for Perfetto cmdline client (/system/bin/perfetto) · 1a9f4f7a
      Primiano Tucci authored
      Instead of having statsd linking the perfetto client library
      and talk directly to its socket, we let just statsd exec()
      the /system/bin/perfetto cmdline client.
      
      There are two reasons for this:
      1) Simplify the interaction between statsd and perfetto, reduce
        dependencies, binary size bloat and isolate faults.
      2) The cmdline client also takes care of handing the trace to
        Dropbox. This allows to expose the binder interaction surface
        to the short-lived cmdline client and avoid to grant binder
        access to the perfetto traced daemon.
      
      This cmdline client will be used by:
       - statsd
       - the shell user (for our UI and Studio)
      
      Bug: 70942310
      Change-Id: I8cdde181481ad0a1a5cae5937ac446cedac54a1f
      1a9f4f7a
  10. Jan 25, 2018
  11. Jan 24, 2018
  12. Jan 19, 2018
    • Yao Chen's avatar
      Allow dumpstate to call statsd. This is needed for bugreport. · b10ff337
      Yao Chen authored
      Selinux violations while calling dump() on statsd by bugreport.
      
      avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1
      denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1
      avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1
      avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1
      
      Test: manual
      Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
      b10ff337
  13. Jan 10, 2018
    • yro's avatar
      Update statsd sepolicies to avoid selinux violations during cts tests · e27af27f
      yro authored
      and pulling metrics
      
      Bug: 63757906
      Test: manual testing conducted
      Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
      e27af27f
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  14. Jan 09, 2018
  15. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
  16. Dec 19, 2017
  17. Dec 16, 2017
Loading