Skip to content
Snippets Groups Projects
  1. Jan 19, 2018
  2. Jan 11, 2018
    • Jeff Vander Stoep's avatar
      relabel files in /proc/net/xt_qtaguid/ · 43303c8b
      Jeff Vander Stoep authored
      /proc/net/xt_qtaguid is used by apps to track their network data
      use. Limit access to just zygote spawned processes - apps and
      system_server, omitting access to isolated_app which is not allowed
      to create network sockets.
      As Android moves to eBPF for app's network data stats, access to
      /proc/net/xt_qtaguid will be removed entirely. Segmenting access off
      is the first step.
      Bug: 68774956
      
      This change also helps further segment and whitelist access to
      files in /proc/net and is a step in the lockdown of /proc/net.
      Bug: 9496886
      
      Test: boot Taimen. Walk through setup-wizard. Make phone call and
          video call. Browse web. Watch youtube. Navigate in maps.
      Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \
          android.appsecurity.cts.AppSecurityTests
      Test: cts-tradefed run cts -m CtsNativeNetTestCases
      Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \
          com.android.server.cts.NetstatsIncidentTest
      Test: cts-tradefed run cts -m CtsOsTestCases -t \
          android.os.cts.StrictModeTest
      Test: cts-tradefed run cts -m CtsNetTestCases -t \
          android.net.cts.TrafficStatsTest
      Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \
          android.app.usage.cts.NetworkUsageStatsTest
      Test: vts-tradefed run vts -m VtsQtaguidTest
      Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
      43303c8b
  3. Jan 10, 2018
    • Treehugger Robot's avatar
      70d2bb43
    • Treehugger Robot's avatar
      Merge "OWNERS: add Joel" · 73b9d8d8
      Treehugger Robot authored
      73b9d8d8
    • Treehugger Robot's avatar
      Merge changes I64b2f1ad,I9db561ee · be7b1b4f
      Treehugger Robot authored
      * changes:
        vold_prepare_subdirs: grant chown
        statsd: annotate boot denials
      be7b1b4f
    • Jeff Vander Stoep's avatar
      OWNERS: add Joel · 2f2d8aba
      Jeff Vander Stoep authored
      Test: none
      Change-Id: I42f2c2a09235d907b020c4924b91a3428f6c9d8e
      2f2d8aba
    • Jeff Vander Stoep's avatar
      vold_prepare_subdirs: grant chown · bdbdb0f2
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { chown } for comm="vold_prepare_su" capability=0
      scontext=u:r:vold_prepare_subdirs:s0
      tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      
      Bug: 71796118
      Test: build
      Change-Id: I64b2f1ad8d6e0748c5820b8a37a4fc4f4101d1fb
      bdbdb0f2
    • Jeff Vander Stoep's avatar
      statsd: annotate boot denials · 79867779
      Jeff Vander Stoep authored
      Point logspam to its owner.
      
      Bug: 71537285
      Test: build
      Change-Id: I9db561ee6f2857214b7945b312e6d303630724ea
      79867779
    • Jaekyun Seok's avatar
      Whitelist exported platform properties · e4971454
      Jaekyun Seok authored
      This CL lists all the exported platform properties in
      private/exported_property_contexts.
      
      Additionally accessing core_property_type from vendor components is
      restricted.
      Instead public_readable_property_type is used to allow vendor components
      to read exported platform properties, and accessibility from
      vendor_init is also specified explicitly.
      
      Note that whitelisting would be applied only if
      PRODUCT_COMPATIBLE_PROPERTY is set on.
      
      Bug: 38146102
      Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true
      Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
      e4971454
    • yro's avatar
      Update statsd sepolicies to avoid selinux violations during cts tests · e27af27f
      yro authored
      and pulling metrics
      
      Bug: 63757906
      Test: manual testing conducted
      Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
      e27af27f
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  4. Jan 09, 2018
  5. Jan 08, 2018
  6. Jan 05, 2018
  7. Jan 04, 2018
  8. Jan 03, 2018
  9. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
Loading