Skip to content
Snippets Groups Projects
  1. Mar 12, 2018
    • Bowgo Tsai's avatar
      Adding /odm support · dd6efea2
      Bowgo Tsai authored
      /odm partition isn't mandatory and the following symlinks will exist on
      a device without /odm partition.
      
        /odm/app ->/vendor/odm/app
        /odm/bin ->/vendor/odm/bin
        /odm/etc ->/vendor/odm/etc
        /odm/firmware ->/vendor/odm/firmware
        /odm/framework ->/vendor/odm/framework
        /odm/lib -> /vendor/odm/lib
        /odm/lib64 -> /vendor/odm/lib64
        /odm/overlay -> /vendor/odm/overlay
        /odm/priv-app -> /vendor/odm/priv-app
      
      This CL allows all domains to access the symlinks, also removes the
      Treble compliance neverallows on them because the actual restrictions
      should apply to the real path directly.
      
      Bug: 70678783
      Test: boot a device
      Change-Id: If1522780a13710d8a592272dc688685cbae29f52
      dd6efea2
  2. Mar 01, 2018
  3. Feb 28, 2018
  4. Feb 27, 2018
  5. Feb 26, 2018
  6. Feb 24, 2018
  7. Feb 23, 2018
    • Treehugger Robot's avatar
    • Bookatz's avatar
      Fix benign statsd selinux violations · c9f205b5
      Bookatz authored
      These two selinux policy violations keep showing up from statsd's CTS
      tests, although statsd and the CTS test seemed to function fine despite
      them. Nonetheless, they seem reasonable to add to the list.
      
      Bug: 73548694
      Test: N/A. It didn't seem to be causing any issues in the first place.
      Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
      c9f205b5
    • Nick Kralevich's avatar
      Thank you · 46eaa82e
      Nick Kralevich authored
      After 9 amazing years with Android, it's time to try something new.
      I've moved over to Fuchsia (https://en.wikipedia.org/wiki/Google_Fuchsia)
      where I'll be helping define security for a new, experimental operating
      system.
      
      My time in Android has been the most rewarding of my life. I couldn't
      be more proud of our work in creating a trustworthy operating system
      used by billions(!) of people, from rich to poor. It's quotes like this
      which give me the warm fuzzies:
      
        https://threatpost.com/whats-new-in-android-8-0-oreo-security/128061/
      
        "Android O is a big step forward," said Duo Security’s Lady.
        He said with O, Google closes the security gap on the iPhone.
        "It used to be if you cared about security you had to pay a
        premium and buy an iPhone. Soon, even a $50 Android device
        running O will be on par with a $1,000 iPhone X when it comes
        to security."
      
      The platform team is in good hands, with Rene Mayrhofer now leading the
      charge to make Android the most secure, privacy preserving operating
      system in existence. And thank you to the rest of the team for making
      my time in Android so wonderful.
      
      And a special thank you to Stephen Smalley of the Trusted Systems
      Research Group for his leadership and guidance. Android Security would
      not be where it is today without you.
      
      =====
      
      Keeping with the principle of least privilege, this change removes
      myself from the OWNERS file for system/sepolicy. Let us always strive to
      build systems so strong that we ourselves cannot even break into them,
      and so private that people can trust us with their most sensitive data.
      
      =====
      
      Test: Tested every day by billions of users. ;-)
      Change-Id: Ia7d0f3f75fdbd69cc720d02fd5a9b9e92ae607ae
      46eaa82e
    • Florian Mayer's avatar
      Allow traced_probes to list the system partition · ef6358bb
      Florian Mayer authored
      Relevant denies:
      
      [    2.560660] type=1400 audit(1519404055.529:9): avc: denied { read }
      for pid=896 comm=traced_probes name=system dev=sda22 ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Allowing only read then gives:
      [    2.554718] type=1400 audit(1519404863.506:9): avc: denied { open }
      for pid=890 comm="traced_probes" path="/system" dev="sda22" ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Test: flashed and ran directory listing code.
      Bug: 73625480
      ef6358bb
    • Robert Sesek's avatar
      Remove rules for starting the webview_zygote as a child of init. · 869562e9
      Robert Sesek authored
      The webview_zygote is now launched as a child-zygote process from the
      main zygote process.
      
      Bug: 63749735
      Test: m
      Test: Launch "Third-party licenses" activity from Settings, and it
            renders correctly via the WebView.
      Merged-In: I9c948b58a969d35d5a5add4b6ab62b8f990645d1
      Change-Id: I153476642cf14883b0dfea0d9f5b3b5e30ac1c08
      869562e9
    • Jeff Vander Stoep's avatar
      Useful neverallow errors · 7636d607
      Jeff Vander Stoep authored
      Neverallow errors include the file name and line number of the
      violated rule. However, if multiple neverallow rules are included
      within a single macro, then the line number is for the entire macro,
      not the individual neverallow rule that is violated. To fix this,
      only include one neverallow rule per macro.
      
      This changes nothing on device, nor does it change the results of
      compilation, it only makes the printed errors more useful.
      
      Bug: 69139821
      Test: build aosp_taimen-userdebug (neverallow rules are build time
          tests)
      
      Change-Id: Id0fc5906431db20e71265c7e9d55fbee4bdf53db
      7636d607
  8. Feb 22, 2018
    • Sandeep Patil's avatar
      Add label for kernel test files and executables · 34e35e9e
      Sandeep Patil authored
      
      This required for kernel to do loopback mounts on filesystem
      images created by the kernel system call tests in LTP.
      
      Add a corresponding neverallow to stop all domains from accessing
      the location at /data/local/tmp/ltp.
      
      Bug: 73220071
      Test: Boot sailfish successfully
      Test: run vts-kernel -m VtsKernelLtp -t syscalls.fchown04
      
      Change-Id: I73f5f14017e22971fc246a05751ba67be4653bca
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      34e35e9e
  9. Feb 21, 2018
    • Robert Sesek's avatar
      Allow zygote to setpgid on webview_zygote. · 63bcf4de
      Robert Sesek authored
      Bug: 73720684
      Bug: 73720684
      Test: m
      Test: BootTest on taimen
      Change-Id: I5a58fd1cce568cc50ba791f445f5c148eb87b474
      63bcf4de
    • Treehugger Robot's avatar
      ba0310ad
    • Primiano Tucci's avatar
      perfetto: Make producer socket MLS-aware · 5ef6669b
      Primiano Tucci authored
      The previous selinux rules obtained via audit2allow didn't really
      work with the case of apps connecting to the producer socket,
      despite all the allow rules being correctly in place.
      This was failing our CTS tests.
      
      The reason for the failure (see denials pasted below) is due to
      Multi Level Security (for multi-user), which was still preventing
      apps form a different level to connect to the traced producer
      socket and write to the shmem buffers they get passed back.
      This CL tags the objects being accessed as mlstrusted.
      CTS tests pass with this CL.
      
      Denials:
      avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
      avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
      avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
      avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
      avc: denied { write } for pid=8545 comm="traced_probes" path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=104483 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
      
      Change-Id: I1598bc0b07bf39b8d0420b66caf06a4ca884f383
      Bug: 73340039
      Test: CtsPerfettoTestCases
      5ef6669b
    • Carmen Jackson's avatar
      Allow Traceur app to remove trace files. · fa0bf19b
      Carmen Jackson authored
      Bug: 73660835
      Test: With the other commit on this topic, clearing all trace files via
      the app works properly.
      
      Change-Id: I27a4a5a14d9afe817683f1b046a644648a84badc
      fa0bf19b
  10. Feb 16, 2018
Loading