Skip to content
Snippets Groups Projects
  1. Mar 07, 2018
  2. Mar 06, 2018
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · bfa95fcd
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      bfa95fcd
  3. Mar 02, 2018
    • Primiano Tucci's avatar
      perfetto: allow traced_probes to execute atrace · 54a86e2b
      Primiano Tucci authored
      This CL adds the SELinux permissions required to execute
      atrace and get userspace tracing events from system services.
      This is to enable tracing of events coming from surfaceflinger,
      audio HAL, etc.
      atrace, when executed, sets a bunch of debug.atrace. properties
      and sends an IPC via binder/hwbinder to tell the services to
      reload that property.
      
      Change-Id: I2b0a66dcb519cb296e1d0e6e3f15a425dc809089
      Bug: 73340039
      54a86e2b
  4. Mar 01, 2018
  5. Feb 28, 2018
  6. Feb 27, 2018
  7. Feb 26, 2018
  8. Feb 24, 2018
  9. Feb 23, 2018
    • Treehugger Robot's avatar
    • Bookatz's avatar
      Fix benign statsd selinux violations · c9f205b5
      Bookatz authored
      These two selinux policy violations keep showing up from statsd's CTS
      tests, although statsd and the CTS test seemed to function fine despite
      them. Nonetheless, they seem reasonable to add to the list.
      
      Bug: 73548694
      Test: N/A. It didn't seem to be causing any issues in the first place.
      Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
      c9f205b5
    • Nick Kralevich's avatar
      Thank you · 46eaa82e
      Nick Kralevich authored
      After 9 amazing years with Android, it's time to try something new.
      I've moved over to Fuchsia (https://en.wikipedia.org/wiki/Google_Fuchsia)
      where I'll be helping define security for a new, experimental operating
      system.
      
      My time in Android has been the most rewarding of my life. I couldn't
      be more proud of our work in creating a trustworthy operating system
      used by billions(!) of people, from rich to poor. It's quotes like this
      which give me the warm fuzzies:
      
        https://threatpost.com/whats-new-in-android-8-0-oreo-security/128061/
      
        "Android O is a big step forward," said Duo Security’s Lady.
        He said with O, Google closes the security gap on the iPhone.
        "It used to be if you cared about security you had to pay a
        premium and buy an iPhone. Soon, even a $50 Android device
        running O will be on par with a $1,000 iPhone X when it comes
        to security."
      
      The platform team is in good hands, with Rene Mayrhofer now leading the
      charge to make Android the most secure, privacy preserving operating
      system in existence. And thank you to the rest of the team for making
      my time in Android so wonderful.
      
      And a special thank you to Stephen Smalley of the Trusted Systems
      Research Group for his leadership and guidance. Android Security would
      not be where it is today without you.
      
      =====
      
      Keeping with the principle of least privilege, this change removes
      myself from the OWNERS file for system/sepolicy. Let us always strive to
      build systems so strong that we ourselves cannot even break into them,
      and so private that people can trust us with their most sensitive data.
      
      =====
      
      Test: Tested every day by billions of users. ;-)
      Change-Id: Ia7d0f3f75fdbd69cc720d02fd5a9b9e92ae607ae
      46eaa82e
    • Florian Mayer's avatar
      Allow traced_probes to list the system partition · ef6358bb
      Florian Mayer authored
      Relevant denies:
      
      [    2.560660] type=1400 audit(1519404055.529:9): avc: denied { read }
      for pid=896 comm=traced_probes name=system dev=sda22 ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Allowing only read then gives:
      [    2.554718] type=1400 audit(1519404863.506:9): avc: denied { open }
      for pid=890 comm="traced_probes" path="/system" dev="sda22" ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Test: flashed and ran directory listing code.
      Bug: 73625480
      ef6358bb
    • Robert Sesek's avatar
      Remove rules for starting the webview_zygote as a child of init. · 869562e9
      Robert Sesek authored
      The webview_zygote is now launched as a child-zygote process from the
      main zygote process.
      
      Bug: 63749735
      Test: m
      Test: Launch "Third-party licenses" activity from Settings, and it
            renders correctly via the WebView.
      Merged-In: I9c948b58a969d35d5a5add4b6ab62b8f990645d1
      Change-Id: I153476642cf14883b0dfea0d9f5b3b5e30ac1c08
      869562e9
    • Jeff Vander Stoep's avatar
      Useful neverallow errors · 7636d607
      Jeff Vander Stoep authored
      Neverallow errors include the file name and line number of the
      violated rule. However, if multiple neverallow rules are included
      within a single macro, then the line number is for the entire macro,
      not the individual neverallow rule that is violated. To fix this,
      only include one neverallow rule per macro.
      
      This changes nothing on device, nor does it change the results of
      compilation, it only makes the printed errors more useful.
      
      Bug: 69139821
      Test: build aosp_taimen-userdebug (neverallow rules are build time
          tests)
      
      Change-Id: Id0fc5906431db20e71265c7e9d55fbee4bdf53db
      7636d607
  10. Feb 22, 2018
    • Sandeep Patil's avatar
      Add label for kernel test files and executables · 34e35e9e
      Sandeep Patil authored
      
      This required for kernel to do loopback mounts on filesystem
      images created by the kernel system call tests in LTP.
      
      Add a corresponding neverallow to stop all domains from accessing
      the location at /data/local/tmp/ltp.
      
      Bug: 73220071
      Test: Boot sailfish successfully
      Test: run vts-kernel -m VtsKernelLtp -t syscalls.fchown04
      
      Change-Id: I73f5f14017e22971fc246a05751ba67be4653bca
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      34e35e9e
  11. Feb 21, 2018
Loading