Skip to content
Snippets Groups Projects
  1. Jan 10, 2018
    • Treehugger Robot's avatar
      Merge "OWNERS: add Joel" · 73b9d8d8
      Treehugger Robot authored
      73b9d8d8
    • Treehugger Robot's avatar
      Merge changes I64b2f1ad,I9db561ee · be7b1b4f
      Treehugger Robot authored
      * changes:
        vold_prepare_subdirs: grant chown
        statsd: annotate boot denials
      be7b1b4f
    • Jeff Vander Stoep's avatar
      OWNERS: add Joel · 2f2d8aba
      Jeff Vander Stoep authored
      Test: none
      Change-Id: I42f2c2a09235d907b020c4924b91a3428f6c9d8e
      2f2d8aba
    • Jeff Vander Stoep's avatar
      vold_prepare_subdirs: grant chown · bdbdb0f2
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { chown } for comm="vold_prepare_su" capability=0
      scontext=u:r:vold_prepare_subdirs:s0
      tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      
      Bug: 71796118
      Test: build
      Change-Id: I64b2f1ad8d6e0748c5820b8a37a4fc4f4101d1fb
      bdbdb0f2
    • Jeff Vander Stoep's avatar
      statsd: annotate boot denials · 79867779
      Jeff Vander Stoep authored
      Point logspam to its owner.
      
      Bug: 71537285
      Test: build
      Change-Id: I9db561ee6f2857214b7945b312e6d303630724ea
      79867779
    • yro's avatar
      Update statsd sepolicies to avoid selinux violations during cts tests · e27af27f
      yro authored
      and pulling metrics
      
      Bug: 63757906
      Test: manual testing conducted
      Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
      e27af27f
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  2. Jan 09, 2018
  3. Jan 08, 2018
  4. Jan 05, 2018
  5. Jan 04, 2018
  6. Jan 03, 2018
  7. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
    • Jeff Vander Stoep's avatar
      webview_zygote: allow listing dirs in /system · 3588ddd0
      Jeff Vander Stoep authored
      For consistency with zygote, allow webview_zygote to list directories
      in /system.
      
      Test: Boot Taimen. Verify webiew_zygote denials during boot.
      Bug: 70857705
      Change-Id: I27eb18c377a5240d7430abf301c1c3af61704d59
      3588ddd0
    • Chenbo Feng's avatar
      sepolicy: Allow system server to r/w the bpf maps · 756dd574
      Chenbo Feng authored
      The system server is responsible for providing the network traffic
      stats to Apps and services. Allow it to directly reading the eBPF maps
      that stored these information can make the process of getting traffic
      stats simplier.
      
      Test: No selinux rule violation of system server reading netd bpf object
      Bug: 30950746
      Change-Id: I6d9438d1ed7c9bab45a708f5d2a85eb22f5e8170
      756dd574
    • Chenbo Feng's avatar
      sepolicy: New sepolicy classes and rules about bpf object · 08f92f9c
      Chenbo Feng authored
      Add the new classes for eBPF map and program to limit the access to eBPF
      object. Add corresponding rules to allow netd module initialize bpf
      programs and maps, use the program and read/wirte to eBPF maps.
      
      Test: no bpf sepolicy violations when device boot
      Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
      08f92f9c
    • Chenbo Feng's avatar
      sepolicy: Allow mount cgroupv2 and bpf fs · 254ad0da
      Chenbo Feng authored
      Some necessary sepolicy rule changes for init process to create directory,
      mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
      and pin bpf object as files and read it back from file under the
      directory where bpf filesystem is mounted.
      
      Test: bpf maps show up under /sys/fs/bpf/
      Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
      254ad0da
Loading