Skip to content
Snippets Groups Projects
  1. Mar 07, 2018
  2. Mar 06, 2018
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · bfa95fcd
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      bfa95fcd
  3. Mar 02, 2018
    • Primiano Tucci's avatar
      perfetto: allow traced_probes to execute atrace · 54a86e2b
      Primiano Tucci authored
      This CL adds the SELinux permissions required to execute
      atrace and get userspace tracing events from system services.
      This is to enable tracing of events coming from surfaceflinger,
      audio HAL, etc.
      atrace, when executed, sets a bunch of debug.atrace. properties
      and sends an IPC via binder/hwbinder to tell the services to
      reload that property.
      
      Change-Id: I2b0a66dcb519cb296e1d0e6e3f15a425dc809089
      Bug: 73340039
      54a86e2b
  4. Mar 01, 2018
  5. Feb 28, 2018
  6. Feb 27, 2018
  7. Feb 26, 2018
  8. Feb 24, 2018
  9. Feb 23, 2018
    • Treehugger Robot's avatar
    • Bookatz's avatar
      Fix benign statsd selinux violations · c9f205b5
      Bookatz authored
      These two selinux policy violations keep showing up from statsd's CTS
      tests, although statsd and the CTS test seemed to function fine despite
      them. Nonetheless, they seem reasonable to add to the list.
      
      Bug: 73548694
      Test: N/A. It didn't seem to be causing any issues in the first place.
      Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
      c9f205b5
    • Nick Kralevich's avatar
      Thank you · 46eaa82e
      Nick Kralevich authored
      After 9 amazing years with Android, it's time to try something new.
      I've moved over to Fuchsia (https://en.wikipedia.org/wiki/Google_Fuchsia)
      where I'll be helping define security for a new, experimental operating
      system.
      
      My time in Android has been the most rewarding of my life. I couldn't
      be more proud of our work in creating a trustworthy operating system
      used by billions(!) of people, from rich to poor. It's quotes like this
      which give me the warm fuzzies:
      
        https://threatpost.com/whats-new-in-android-8-0-oreo-security/128061/
      
        "Android O is a big step forward," said Duo Security’s Lady.
        He said with O, Google closes the security gap on the iPhone.
        "It used to be if you cared about security you had to pay a
        premium and buy an iPhone. Soon, even a $50 Android device
        running O will be on par with a $1,000 iPhone X when it comes
        to security."
      
      The platform team is in good hands, with Rene Mayrhofer now leading the
      charge to make Android the most secure, privacy preserving operating
      system in existence. And thank you to the rest of the team for making
      my time in Android so wonderful.
      
      And a special thank you to Stephen Smalley of the Trusted Systems
      Research Group for his leadership and guidance. Android Security would
      not be where it is today without you.
      
      =====
      
      Keeping with the principle of least privilege, this change removes
      myself from the OWNERS file for system/sepolicy. Let us always strive to
      build systems so strong that we ourselves cannot even break into them,
      and so private that people can trust us with their most sensitive data.
      
      =====
      
      Test: Tested every day by billions of users. ;-)
      Change-Id: Ia7d0f3f75fdbd69cc720d02fd5a9b9e92ae607ae
      46eaa82e
    • Florian Mayer's avatar
      Allow traced_probes to list the system partition · ef6358bb
      Florian Mayer authored
      Relevant denies:
      
      [    2.560660] type=1400 audit(1519404055.529:9): avc: denied { read }
      for pid=896 comm=traced_probes name=system dev=sda22 ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Allowing only read then gives:
      [    2.554718] type=1400 audit(1519404863.506:9): avc: denied { open }
      for pid=890 comm="traced_probes" path="/system" dev="sda22" ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Test: flashed and ran directory listing code.
      Bug: 73625480
      ef6358bb
Loading