Commit graph

14779 commits

Author SHA1 Message Date
Tej Singh
276b6f32d0 Merge "Statsd sepolicy for thermal hal"
am: f98cd4faab

Change-Id: I92204ba2793abf52ef1a334962d04dbda2ef7317
2018-02-27 06:47:43 +00:00
Treehugger Robot
f98cd4faab Merge "Statsd sepolicy for thermal hal" 2018-02-27 06:41:49 +00:00
Tej Singh
c26ac738e5 Statsd sepolicy for thermal hal
Updates statsd sepolicy so it can use the thermal hal.

Test: verified these policies solved sepolicy issues with thermal hal.
Change-Id: I36839a72494b084d5742c4d83c3ce9814102b974
2018-02-26 20:32:58 -08:00
Jaekyun Seok
4a62c060e3 Allow vendor-init-settable for ro.radio.noril
ro.radio.noril is used for modem-less products including emulator.

Bug: 73871799
Test: succeeded building and tested with taimen
Change-Id: I2270374a2523889aa4874840594d8267614f93ad
2018-02-26 23:10:10 +00:00
Tri Vo
af5e6f184b Merge "Add removed webview_zygote_socket to 27 mapping file." am: e091dc9051 am: 01b380f4ed
am: 74b3ad28c4

Change-Id: I00752ae5d9975e07bb19dd404f3e69319f6be733
2018-02-26 19:58:43 +00:00
Tri Vo
74b3ad28c4 Merge "Add removed webview_zygote_socket to 27 mapping file." am: e091dc9051
am: 01b380f4ed

Change-Id: Ib607456737116604628164659d264b93354c32d7
2018-02-26 19:51:36 +00:00
Tri Vo
01b380f4ed Merge "Add removed webview_zygote_socket to 27 mapping file."
am: e091dc9051

Change-Id: I392a5bde9d83d83826f3fca91dd2fe56daf6cffa
2018-02-26 19:44:16 +00:00
Treehugger Robot
e091dc9051 Merge "Add removed webview_zygote_socket to 27 mapping file." 2018-02-26 19:34:29 +00:00
Tri Vo
adf11f4caa Add removed webview_zygote_socket to 27 mapping file.
Bug: 69390067
Test: manual run of treble_sepolicy_tests
Change-Id: I19252eb743e6527cbe262b1e066a3f67f7186994
2018-02-26 09:09:24 -08:00
Nick Kralevich
ca68578860 Merge "Thank you" am: 821c44421e am: 600b0f96cd
am: 2a2d81cdd0

Change-Id: Idc92bc14e272f6f42b1263f2cb38e793c639d0f9
2018-02-24 15:20:45 +00:00
Nick Kralevich
2a2d81cdd0 Merge "Thank you" am: 821c44421e
am: 600b0f96cd

Change-Id: I2f8bceb47fffefd6734376ca58136aab930bf092
2018-02-24 15:12:40 +00:00
Nick Kralevich
600b0f96cd Merge "Thank you"
am: 821c44421e

Change-Id: Ifd06d59f174db6e6bede66fbf5c9dde06d3c41f9
2018-02-24 15:04:34 +00:00
Treehugger Robot
821c44421e Merge "Thank you" 2018-02-24 14:57:47 +00:00
Florian Mayer
8bd4ff98a8 Merge "Allow traced_probes to list the system partition" am: 518648e5d4 am: 525ff5c95f
am: 2193d506f5

Change-Id: I720c01d560ac7dbd0d0fd12d2fa67199467cbb76
2018-02-24 00:13:40 +00:00
Florian Mayer
2193d506f5 Merge "Allow traced_probes to list the system partition" am: 518648e5d4
am: 525ff5c95f

Change-Id: I5e1ae97675d0180ff87fc6bf23433985dcdf188e
2018-02-24 00:07:33 +00:00
Florian Mayer
525ff5c95f Merge "Allow traced_probes to list the system partition"
am: 518648e5d4

Change-Id: Ib895d9ae74d3380cdc26790045a7e56d27c51186
2018-02-24 00:00:56 +00:00
Treehugger Robot
518648e5d4 Merge "Allow traced_probes to list the system partition" 2018-02-23 23:52:12 +00:00
Bookatz
7d7675fa1d Fix benign statsd selinux violations am: c9f205b56a am: aca8ee3a53
am: c214840c18

Change-Id: Ife39c3cd91eb333c864cb42b256c04330fa56c04
2018-02-23 23:37:05 +00:00
Bookatz
c214840c18 Fix benign statsd selinux violations am: c9f205b56a
am: aca8ee3a53

Change-Id: I8264cd5c0d9bb677a4090479cda01c2f0f957d75
2018-02-23 23:31:32 +00:00
Bookatz
aca8ee3a53 Fix benign statsd selinux violations
am: c9f205b56a

Change-Id: If5ea5405d1e0d17e6b51a9b0b0e2419fc32b6ed0
2018-02-23 23:25:04 +00:00
Bookatz
c9f205b56a Fix benign statsd selinux violations
These two selinux policy violations keep showing up from statsd's CTS
tests, although statsd and the CTS test seemed to function fine despite
them. Nonetheless, they seem reasonable to add to the list.

Bug: 73548694
Test: N/A. It didn't seem to be causing any issues in the first place.
Change-Id: Id36c5229c0d7de83675166caeb07c87b719dc374
2018-02-23 13:06:32 -08:00
Nick Kralevich
46eaa82e35 Thank you
After 9 amazing years with Android, it's time to try something new.
I've moved over to Fuchsia (https://en.wikipedia.org/wiki/Google_Fuchsia)
where I'll be helping define security for a new, experimental operating
system.

My time in Android has been the most rewarding of my life. I couldn't
be more proud of our work in creating a trustworthy operating system
used by billions(!) of people, from rich to poor. It's quotes like this
which give me the warm fuzzies:

  https://threatpost.com/whats-new-in-android-8-0-oreo-security/128061/

  "Android O is a big step forward," said Duo Security’s Lady.
  He said with O, Google closes the security gap on the iPhone.
  "It used to be if you cared about security you had to pay a
  premium and buy an iPhone. Soon, even a $50 Android device
  running O will be on par with a $1,000 iPhone X when it comes
  to security."

The platform team is in good hands, with Rene Mayrhofer now leading the
charge to make Android the most secure, privacy preserving operating
system in existence. And thank you to the rest of the team for making
my time in Android so wonderful.

And a special thank you to Stephen Smalley of the Trusted Systems
Research Group for his leadership and guidance. Android Security would
not be where it is today without you.

=====

Keeping with the principle of least privilege, this change removes
myself from the OWNERS file for system/sepolicy. Let us always strive to
build systems so strong that we ourselves cannot even break into them,
and so private that people can trust us with their most sensitive data.

=====

Test: Tested every day by billions of users. ;-)
Change-Id: Ia7d0f3f75fdbd69cc720d02fd5a9b9e92ae607ae
2018-02-23 10:33:00 -08:00
Robert Sesek
e756cc7a7f Remove rules for starting the webview_zygote as a child of init. am: 869562e9e3 am: 31f0d0171a
am: 19e5920e73  -s ours

Change-Id: If6d1a563bbc18289d91d6547f6b4e176e57b06b5
2018-02-23 18:04:34 +00:00
Robert Sesek
19e5920e73 Remove rules for starting the webview_zygote as a child of init. am: 869562e9e3
am: 31f0d0171a

Change-Id: Ica8abeb46c0a9324ecfed6a7936f8830f09a32b7
2018-02-23 17:53:00 +00:00
Robert Sesek
31f0d0171a Remove rules for starting the webview_zygote as a child of init.
am: 869562e9e3

Change-Id: I7925e1e5cd81e1d7d9d903853044e9a394ac353c
2018-02-23 17:47:26 +00:00
Florian Mayer
ef6358bb77 Allow traced_probes to list the system partition
Relevant denies:

[    2.560660] type=1400 audit(1519404055.529:9): avc: denied { read }
for pid=896 comm=traced_probes name=system dev=sda22 ino=17
scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
tclass=dir permissive=0

Allowing only read then gives:
[    2.554718] type=1400 audit(1519404863.506:9): avc: denied { open }
for pid=890 comm="traced_probes" path="/system" dev="sda22" ino=17
scontext=u:r:traced_probes:s0 tcontext=u:object_r:system_file:s0
tclass=dir permissive=0

Test: flashed and ran directory listing code.
Bug: 73625480
2018-02-23 17:35:42 +00:00
Robert Sesek
869562e9e3 Remove rules for starting the webview_zygote as a child of init.
The webview_zygote is now launched as a child-zygote process from the
main zygote process.

Bug: 63749735
Test: m
Test: Launch "Third-party licenses" activity from Settings, and it
      renders correctly via the WebView.
Merged-In: I9c948b58a969d35d5a5add4b6ab62b8f990645d1
Change-Id: I153476642cf14883b0dfea0d9f5b3b5e30ac1c08
2018-02-23 10:55:22 -05:00
TreeHugger Robot
d580a23ec1 Merge "Remove rules for starting the webview_zygote as a child of init." 2018-02-23 15:54:32 +00:00
Jeff Vander Stoep
ebdf8f7eac Useful neverallow errors am: 7636d6071a am: 172d7a84f2
am: 64b615351a

Change-Id: Ida581950c8591eb64c232ca752d16c4f8cd34c45
2018-02-23 08:14:10 +00:00
Jeff Vander Stoep
64b615351a Useful neverallow errors am: 7636d6071a
am: 172d7a84f2

Change-Id: I4d2f74a5e4a55677fb4f0707b56336588a687571
2018-02-23 08:08:52 +00:00
Jeff Vander Stoep
172d7a84f2 Useful neverallow errors
am: 7636d6071a

Change-Id: I1a9e98ca5cb7e8ec415836b2bd1a1f1d7ede8d21
2018-02-23 08:03:46 +00:00
Jeff Vander Stoep
7636d6071a Useful neverallow errors
Neverallow errors include the file name and line number of the
violated rule. However, if multiple neverallow rules are included
within a single macro, then the line number is for the entire macro,
not the individual neverallow rule that is violated. To fix this,
only include one neverallow rule per macro.

This changes nothing on device, nor does it change the results of
compilation, it only makes the printed errors more useful.

Bug: 69139821
Test: build aosp_taimen-userdebug (neverallow rules are build time
    tests)

Change-Id: Id0fc5906431db20e71265c7e9d55fbee4bdf53db
2018-02-23 07:55:14 +00:00
Sandeep Patil
b827155cce Add label for kernel test files and executables am: 34e35e9e95 am: bf01e8e1d9
am: d044177ae8

Change-Id: I2c84e9a6252e5cb2c85ec1e50f9e2583f3fb9027
2018-02-23 00:26:18 +00:00
Sandeep Patil
d044177ae8 Add label for kernel test files and executables am: 34e35e9e95
am: bf01e8e1d9

Change-Id: I8ba2fcacfe6c062ecf251c80264eb08e4f28039e
2018-02-23 00:21:42 +00:00
Sandeep Patil
bf01e8e1d9 Add label for kernel test files and executables
am: 34e35e9e95

Change-Id: I22f991b650802739680404476a1521e2451729a5
2018-02-23 00:16:36 +00:00
Sandeep Patil
34e35e9e95 Add label for kernel test files and executables
This required for kernel to do loopback mounts on filesystem
images created by the kernel system call tests in LTP.

Add a corresponding neverallow to stop all domains from accessing
the location at /data/local/tmp/ltp.

Bug: 73220071
Test: Boot sailfish successfully
Test: run vts-kernel -m VtsKernelLtp -t syscalls.fchown04

Change-Id: I73f5f14017e22971fc246a05751ba67be4653bca
Signed-off-by: Sandeep Patil <sspatil@google.com>
2018-02-22 12:55:30 -08:00
Robert Sesek
b2a679f903 Allow zygote to setpgid on webview_zygote. am: 63bcf4debb am: 1b6c8a5186
am: 88f7e781d9

Change-Id: I87cb9fab057eb40f0fda047e85d2a8506de91f71
2018-02-22 00:58:49 +00:00
Robert Sesek
88f7e781d9 Allow zygote to setpgid on webview_zygote. am: 63bcf4debb
am: 1b6c8a5186

Change-Id: Id2c3da51cad3287b675114e0eb94dee25c0e30b8
2018-02-22 00:39:27 +00:00
Robert Sesek
1b6c8a5186 Allow zygote to setpgid on webview_zygote.
am: 63bcf4debb

Change-Id: Icc7d15d4b2bade74336388e9fd0ffe445f7c0a9f
2018-02-22 00:14:45 +00:00
Robert Sesek
63bcf4debb Allow zygote to setpgid on webview_zygote.
Bug: 73720684
Bug: 73720684
Test: m
Test: BootTest on taimen
Change-Id: I5a58fd1cce568cc50ba791f445f5c148eb87b474
2018-02-21 16:34:10 -05:00
Carmen Jackson
16bc7861f8 Merge "Allow Traceur app to remove trace files." am: ba0310adcc am: 95af23922c
am: 9148c72255

Change-Id: Ic77ad7f5b80eea3700af1b3deec79ee03058bf2c
2018-02-21 21:26:52 +00:00
Carmen Jackson
9148c72255 Merge "Allow Traceur app to remove trace files." am: ba0310adcc
am: 95af23922c

Change-Id: Ifb7877600b8c728f3e8efe26aeb301d8dfa0288a
2018-02-21 21:16:51 +00:00
Carmen Jackson
95af23922c Merge "Allow Traceur app to remove trace files."
am: ba0310adcc

Change-Id: I277a78961c09e9dbe4c1fa4ada68ae12ca7e301d
2018-02-21 21:09:45 +00:00
Treehugger Robot
ba0310adcc Merge "Allow Traceur app to remove trace files." 2018-02-21 20:55:35 +00:00
Primiano Tucci
4120c8c94d perfetto: Make producer socket MLS-aware am: 5ef6669b04 am: 2337f2950c
am: 8bf6ccb78a

Change-Id: I40e25bbdec238c250308f8a09571e4c4a1bea363
2018-02-21 20:17:09 +00:00
Primiano Tucci
8bf6ccb78a perfetto: Make producer socket MLS-aware am: 5ef6669b04
am: 2337f2950c

Change-Id: I64579d8df8832b2f63310f6eb9cfd7a6c482ac72
2018-02-21 19:57:20 +00:00
Primiano Tucci
2337f2950c perfetto: Make producer socket MLS-aware
am: 5ef6669b04

Change-Id: Ieb70f2672b3956befa8c755c7f1535550f400c02
2018-02-21 19:50:47 +00:00
Primiano Tucci
5ef6669b04 perfetto: Make producer socket MLS-aware
The previous selinux rules obtained via audit2allow didn't really
work with the case of apps connecting to the producer socket,
despite all the allow rules being correctly in place.
This was failing our CTS tests.

The reason for the failure (see denials pasted below) is due to
Multi Level Security (for multi-user), which was still preventing
apps form a different level to connect to the traced producer
socket and write to the shmem buffers they get passed back.
This CL tags the objects being accessed as mlstrusted.
CTS tests pass with this CL.

Denials:
avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
avc: denied { write } for pid=8545 comm="traced_probes" name="traced_producer" dev="tmpfs" ino=23629 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=1
avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
avc: denied { connectto } for pid=8545 comm="traced_probes" path="/dev/socket/traced_producer" scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:traced:s0 tclass=unix_stream_socket permissive=1
avc: denied { write } for pid=8545 comm="traced_probes" path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=104483 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1

Change-Id: I1598bc0b07bf39b8d0420b66caf06a4ca884f383
Bug: 73340039
Test: CtsPerfettoTestCases
2018-02-21 14:37:58 +00:00
Carmen Jackson
fa0bf19bd1 Allow Traceur app to remove trace files.
Bug: 73660835
Test: With the other commit on this topic, clearing all trace files via
the app works properly.

Change-Id: I27a4a5a14d9afe817683f1b046a644648a84badc
2018-02-20 17:03:08 -08:00
Bookatz
1a50b42cbe Merge "Statsd selinux allow shell to interact with statsd" am: fcd48fd593 am: 1de018fbb1
am: 1cbf834a20

Change-Id: I224cc0dccef0ff03491c3a7c5f29c0e2b750ab60
2018-02-16 23:57:29 +00:00