Skip to content
Snippets Groups Projects
  1. Mar 06, 2018
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · bfa95fcd
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      bfa95fcd
  2. Mar 01, 2018
    • Jerry Zhang's avatar
      Add functionfs access to system_server. · 1d401545
      Jerry Zhang authored
      UsbDeviceManager in system_server now
      helps set up the endpoint files.
      
      Bug: 72877174
      Test: No selinux denials
      Change-Id: I96b11ee68799ac29b756d2034e7f5e4660dbed98
      1d401545
    • Alan Stokes's avatar
      Allow hal_vibrator access to sysfs_vibrator files. · 17d008ae
      Alan Stokes authored
      We already grant rw file access, but without dir search it's not much
      use.
      
      denied { search } for name="vibrator" dev="sysfs" ino=49606 scontext=u:r:hal_vibrator_default:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=dir permissive=0
      
      Bug: 72643420
      Test: Builds, denial gone
      Change-Id: I3513c0a14f0ac1e60517009046e2654f1fc45c66
      17d008ae
    • huans's avatar
      Add shell:fifo_file permission for cameraserver · a6acef9a
      huans authored
      Bug: 73952536
      Test: run cts -m CtsCameraTestCases -t android.hardware.camera2.cts.IdleUidTest#testCameraAccessBecomingInactiveUid
      Change-Id: I508352671367dfa106e80108c3a5c0255b5273b2
      a6acef9a
  3. Feb 28, 2018
  4. Feb 27, 2018
  5. Feb 26, 2018
  6. Feb 24, 2018
  7. Feb 23, 2018
    • Treehugger Robot's avatar
    • Bookatz's avatar
      Fix benign statsd selinux violations · c9f205b5
      Bookatz authored
      These two selinux policy violations keep showing up from statsd's CTS
      tests, although statsd and the CTS test seemed to function fine despite
      them. Nonetheless, they seem reasonable to add to the list.
      
      Bug: 73548694
      Test: N/A. It didn't seem to be causing any issues in the first place.
      Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
      c9f205b5
    • Nick Kralevich's avatar
      Thank you · 46eaa82e
      Nick Kralevich authored
      After 9 amazing years with Android, it's time to try something new.
      I've moved over to Fuchsia (https://en.wikipedia.org/wiki/Google_Fuchsia)
      where I'll be helping define security for a new, experimental operating
      system.
      
      My time in Android has been the most rewarding of my life. I couldn't
      be more proud of our work in creating a trustworthy operating system
      used by billions(!) of people, from rich to poor. It's quotes like this
      which give me the warm fuzzies:
      
        https://threatpost.com/whats-new-in-android-8-0-oreo-security/128061/
      
        "Android O is a big step forward," said Duo Security’s Lady.
        He said with O, Google closes the security gap on the iPhone.
        "It used to be if you cared about security you had to pay a
        premium and buy an iPhone. Soon, even a $50 Android device
        running O will be on par with a $1,000 iPhone X when it comes
        to security."
      
      The platform team is in good hands, with Rene Mayrhofer now leading the
      charge to make Android the most secure, privacy preserving operating
      system in existence. And thank you to the rest of the team for making
      my time in Android so wonderful.
      
      And a special thank you to Stephen Smalley of the Trusted Systems
      Research Group for his leadership and guidance. Android Security would
      not be where it is today without you.
      
      =====
      
      Keeping with the principle of least privilege, this change removes
      myself from the OWNERS file for system/sepolicy. Let us always strive to
      build systems so strong that we ourselves cannot even break into them,
      and so private that people can trust us with their most sensitive data.
      
      =====
      
      Test: Tested every day by billions of users. ;-)
      Change-Id: Ia7d0f3f75fdbd69cc720d02fd5a9b9e92ae607ae
      46eaa82e
    • Florian Mayer's avatar
      Allow traced_probes to list the system partition · ef6358bb
      Florian Mayer authored
      Relevant denies:
      
      [    2.560660] type=1400 audit(1519404055.529:9): avc: denied { read }
      for pid=896 comm=traced_probes name=system dev=sda22 ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Allowing only read then gives:
      [    2.554718] type=1400 audit(1519404863.506:9): avc: denied { open }
      for pid=890 comm="traced_probes" path="/system" dev="sda22" ino=17
      scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      Test: flashed and ran directory listing code.
      Bug: 73625480
      ef6358bb
    • Robert Sesek's avatar
      Remove rules for starting the webview_zygote as a child of init. · 869562e9
      Robert Sesek authored
      The webview_zygote is now launched as a child-zygote process from the
      main zygote process.
      
      Bug: 63749735
      Test: m
      Test: Launch "Third-party licenses" activity from Settings, and it
            renders correctly via the WebView.
      Merged-In: I9c948b58a969d35d5a5add4b6ab62b8f990645d1
      Change-Id: I153476642cf14883b0dfea0d9f5b3b5e30ac1c08
      869562e9
    • Jeff Vander Stoep's avatar
      Useful neverallow errors · 7636d607
      Jeff Vander Stoep authored
      Neverallow errors include the file name and line number of the
      violated rule. However, if multiple neverallow rules are included
      within a single macro, then the line number is for the entire macro,
      not the individual neverallow rule that is violated. To fix this,
      only include one neverallow rule per macro.
      
      This changes nothing on device, nor does it change the results of
      compilation, it only makes the printed errors more useful.
      
      Bug: 69139821
      Test: build aosp_taimen-userdebug (neverallow rules are build time
          tests)
      
      Change-Id: Id0fc5906431db20e71265c7e9d55fbee4bdf53db
      7636d607
  8. Feb 22, 2018
    • Sandeep Patil's avatar
      Add label for kernel test files and executables · 34e35e9e
      Sandeep Patil authored
      
      This required for kernel to do loopback mounts on filesystem
      images created by the kernel system call tests in LTP.
      
      Add a corresponding neverallow to stop all domains from accessing
      the location at /data/local/tmp/ltp.
      
      Bug: 73220071
      Test: Boot sailfish successfully
      Test: run vts-kernel -m VtsKernelLtp -t syscalls.fchown04
      
      Change-Id: I73f5f14017e22971fc246a05751ba67be4653bca
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      34e35e9e
  9. Feb 21, 2018
    • Robert Sesek's avatar
      Allow zygote to setpgid on webview_zygote. · 63bcf4de
      Robert Sesek authored
      Bug: 73720684
      Bug: 73720684
      Test: m
      Test: BootTest on taimen
      Change-Id: I5a58fd1cce568cc50ba791f445f5c148eb87b474
      63bcf4de
    • Treehugger Robot's avatar
      ba0310ad
    • Primiano Tucci's avatar
      perfetto: Make producer socket MLS-aware · 5ef6669b
      Primiano Tucci authored
      The previous selinux rules obtained via audit2allow didn't really
      work with the case of apps connecting to the producer socket,
      despite all the allow rules being correctly in place.
      This was failing our CTS tests.
      
      The reason for the failure (see denials pasted below) is due to
      Multi Level Security (for multi-user), which was still preventing
      apps form a different level to connect to the traced producer
      socket and write to the shmem buffers they get passed back.
      This CL tags the objects being accessed as mlstrusted.
      CTS tests pass with this CL.
      
      Denials:
      avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
      avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
      avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
      avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
      avc: denied { write } for pid=8545 comm="traced_probes" path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=104483 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
      
      Change-Id: I1598bc0b07bf39b8d0420b66caf06a4ca884f383
      Bug: 73340039
      Test: CtsPerfettoTestCases
      5ef6669b
    • Carmen Jackson's avatar
      Allow Traceur app to remove trace files. · fa0bf19b
      Carmen Jackson authored
      Bug: 73660835
      Test: With the other commit on this topic, clearing all trace files via
      the app works properly.
      
      Change-Id: I27a4a5a14d9afe817683f1b046a644648a84badc
      fa0bf19b
  10. Feb 16, 2018
Loading