Skip to content
Snippets Groups Projects
  1. Nov 19, 2018
  2. Nov 18, 2018
  3. Nov 17, 2018
    • Nicolas Geoffray's avatar
      Allow zygote to JIT. · 6949a392
      Nicolas Geoffray authored
      bug: 110870380
      Test: device boots, artificially creating a rwx mapping in zygote works.
      
      Change-Id: I81a32b616a68f186867af25528a0348d1ad73a50
      6949a392
    • Bruno Martins's avatar
      sepolicy: Grant mediaextractor access to files over all types of sdcard fs · 7bff13f9
      Bruno Martins authored
       * Account for all possible sdcard-related filesystem types and not only
         sdcardfs:
      
         public/file.te:108:type fuse, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:109:type sdcardfs, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:111:type vfat, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:112:type exfat, sdcard_type, fs_type, mlstrustedobject;
      
      Change-Id: Ic508397bf4ca66a002ada33ac3f600c17b8a1a10
      7bff13f9
    • Jiyong Park's avatar
      Allow domain to getattr on apex_mnt_dir · b1feedc2
      Jiyong Park authored
      The dynamic linker calls realpath(3) on paths found in the linker config
      script. Since realpath() calls lstat() on the parent paths, not allowing
      getattr on /apex and its subdirectories will cause selinux denial spam
      whenever something is executed from APEXes.
      
      Silence the spam by allowing getattr on apex_mnt_dir.
      
      Bug: 117403679
      Bug: 115787633
      Test: m apex.test; m; device is bootable
      
      Change-Id: Ic659582760a3ae146e73770266bc64332b36a97c
      b1feedc2
    • Treehugger Robot's avatar
      b16dcf5f
    • Nick Kralevich's avatar
      vold: remove access to /proc/net files · 1c5d223b
      Nick Kralevich authored
      The auditallow added in commit
      7a4af30b ("Start the process of locking
      down proc/net", May 04 2018), has not been triggered. This is safe to
      delete.
      
      Test: Policy compiles
      Test: no collected SELinux denials
      Bug: 68016944
      Change-Id: Ib45519b91742d09e7b93bbaf972e558848691a80
      1c5d223b
    • Tri Vo's avatar
      Remove redundant cgroup type/labelings. · d918c8df
      Tri Vo authored
      cgroup is labeled from genfs_contexts. Also, cgroup filesystems can't be
      context mounted, i.e. it's not possible to mount them with a label other
      than "cgroup".
      
      Bug: 110962171
      Test: m selinux_policy
      Test: boot aosp_walleye
      Change-Id: I8319b10136c42a42d1edaee47b77ad1698e87f2c
      d918c8df
    • Tri Vo's avatar
      fe14d483
    • Tri Vo's avatar
      Audit /dev access that might no longer be needed after Treble · 3e098089
      Tri Vo authored
      Bug: 110962171
      Test: boot aosp_walleye, aosp_blueline, no log spam from new audit
      Change-Id: Ibeeb317e2cf15584395e3dbb73eb01b827e19a09
      3e098089
    • Treehugger Robot's avatar
      c2f8f67b
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  4. Nov 16, 2018
  5. Nov 15, 2018
Loading