- Jan 10, 2018
-
-
Primiano Tucci authored
Perfetto is a performance instrumentation and logging framework, living in AOSP's /external/pefetto. Perfetto introduces in the system one binary and two daemons (the binary can specialize in either depending on the cmdline). 1) traced: unprivileged daemon. This is architecturally similar to logd. It exposes two UNIX sockets: - /dev/socket/traced_producer : world-accessible, allows to stream tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS from traced to each client process, which needs to be able to mmap it R/W (but not X) - /dev/socket/traced_consumer : privilege-accessible (only from: shell, statsd). It allows to configure tracing and read the trace buffer. 2) traced_probes: privileged daemon. This needs to: - access tracingfs (/d/tracing) to turn tracing on and off. - exec atrace - connect to traced_producer to stream data to traced. init.rc file: https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc Bug: 70942310 Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
-
- Jan 09, 2018
-
-
yro authored
communicate with statsd Test: manual testing conducted Change-Id: Icd268e258f7cbdd9310baab53fe0c66f4f303d5e
-
Treehugger Robot authored
-
Etan Cohen authored
-
Treehugger Robot authored
-
- Jan 08, 2018
-
-
Tom Cherry authored
This reverts commit d711d4d2. Reason for revert: Shouldn't have submitted... Change-Id: I5b88101f381ca59132ec7d24990ea41ac1b84171
-
Tom Cherry authored
getprop is broken out from toolbox/toybox, however its permissions should remain the same, so label it appropriately. Bug: 36001741 Test: boot bullhead with the new getprop Change-Id: I4114ea21998da95173d882038bc6aebf39b64d7f
-
Luis Hector Chavez authored
This reverts commit 640e595a. The corresponding code in libcutils was removed, so this is now unneeded. Bug: 71632076 Test: aosp_sailfish still works Change-Id: I615bab83e9a83bc14439b8ab90c00d3156b0a7c4
-
Treehugger Robot authored
-
- Jan 05, 2018
-
-
Joel Galenson authored
This fixes an incorrect exception in the neverallow rule. Test: Built policy for all lunch targets. Change-Id: I283833131c6f1fd741e934de24c838594ac38a18
-
Tom Cherry authored
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 2 of 2 - removing old entry. Bug: 65108607 Test: integration tests Change-Id: Id2b3d91ea2ca578a5834a299275df188c68475da
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 1 of 2 - adding new entry here, will remove old entry in next CL. Bug: 65108607 Test: integration tests Change-Id: I065ce9d570510180fa8c8f09e1025ac795706405
-
- Jan 04, 2018
-
-
Chen Xu authored
-
Joel Galenson authored
-
Joel Galenson authored
This reverts commit b40eb255. Change-Id: I04d9e76152ed11ada4cabcc79bb4eec827f8abef
-
Treehugger Robot authored
-
fionaxu authored
Bug: 64131637 Test: Manual Change-Id: I0170c5eb465aa663582e3974348380a8f0c9b27f
-
Tom Cherry authored
1) fc_sort is not needed as there is no reason to sort system properties, so this is removed and replaced with a simply copy 2) Use the new property_info_checker instead of checkfc for validating property information. This supports exact match properties and will be extended to verify property schemas in the future. Bug: 36001741 Test: verify bullhead's property contexts correct Test: verify faulty property contexts result in failures Change-Id: Id9bbf401f385206e6907449a510e3111424ce59e
-
Joel Galenson authored
After offline discussions, we decided that this was the proper exception to the neverallow rule. Test: Built policy. Change-Id: Ic1603bfdd803151ccfb79f90195b83b616acc873
-
Treehugger Robot authored
-
- Jan 03, 2018
-
-
Jeff Tinker authored
This fixes failing vts drm tests bug:67675811 Test:vts-tradefed run commandAndExit vts -m VtsHalDrmV1_0Target Change-Id: I2f7e1c97e8c70fc312ca3c2c901f0a9607b05e83
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Shawn Willden authored
Test: Boot the device Change-Id: Ia468941e78803edebe311c73f424a41ac1faeaee
-
Jeff Vander Stoep authored
zygote->webview_zygote. Forgot to ammend local change. Test: webview_zygote denials are gone. Change-Id: I02869812feafd127b39e567c28e7278133770e97
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Commit erroneously 55039509 removed init's read access to /sys/devices/virtual/block/zram*. Restore access. Test: cat /proc/meminfo ... SwapTotal: 524284 kB SwapFree: 524284 kB ... Bug: 71510938 Change-Id: I20268168caa541a7dafa1e32339641095e1e524b
-
- Jan 02, 2018
-
-
Max Bires authored
This CL creates a traceur_app domain with userdebug privileges akin to what shell has with regards to being able to find most services on device. Previously, traceur was running as shell which was an unintentional abuse of selinux architecture. Bug: 68126425 Test: Traceur functions outside of shell user privilege Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
-
Jeff Vander Stoep authored
For consistency with zygote, allow webview_zygote to list directories in /system. Test: Boot Taimen. Verify webiew_zygote denials during boot. Bug: 70857705 Change-Id: I27eb18c377a5240d7430abf301c1c3af61704d59
-
Chenbo Feng authored
The system server is responsible for providing the network traffic stats to Apps and services. Allow it to directly reading the eBPF maps that stored these information can make the process of getting traffic stats simplier. Test: No selinux rule violation of system server reading netd bpf object Bug: 30950746 Change-Id: I6d9438d1ed7c9bab45a708f5d2a85eb22f5e8170
-
Chenbo Feng authored
Add the new classes for eBPF map and program to limit the access to eBPF object. Add corresponding rules to allow netd module initialize bpf programs and maps, use the program and read/wirte to eBPF maps. Test: no bpf sepolicy violations when device boot Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
-
Chenbo Feng authored
Some necessary sepolicy rule changes for init process to create directory, mount cgroupv2 module and mount bpf filesystem. Also allow netd to create and pin bpf object as files and read it back from file under the directory where bpf filesystem is mounted. Test: bpf maps show up under /sys/fs/bpf/ Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
-
Ricky Wai authored
Bug: 63908748 Test: Able to boot Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
-
Treehugger Robot authored
-
- Dec 30, 2017
-
-
Treehugger Robot authored
-
- Dec 29, 2017
-
-
Andreas Gampe authored
Add policy for the perfprofd binder service. For now, only allow su to talk to it. Test: m Change-Id: I690f75460bf513cb326314cce633fa25453515d6
-
- Dec 22, 2017
-
-
Treehugger Robot authored
-
Steven Moreland authored
These are device specific. Bug: 70846424 Test: bugreport Change-Id: Ic22c972f1b09988a8eccf0823dd0d87fc0c0a1f7
-