Skip to content
Snippets Groups Projects
  1. Nov 19, 2018
    • David Brazdil's avatar
      Remove 'dex2oat_exec' from untrusted_app · 535c5d2b
      David Brazdil authored
      Remove the permission to execute dex2oat from apps targetSdkVersion>28.
      This has been historically used by ART to compile secondary dex files
      but that functionality has been removed in Q and the permission is
      therefore not needed.
      
      Some legacy apps do invoke dex2oat directly. Hence allow (with audit) for
      targetSdkVersion<= 28.
      
      Test: atest CtsSelinuxTargetSdk25TestCases
      Test: atest CtsSelinuxTargetSdk27TestCases
      Test: atest CtsSelinuxTargetSdkCurrentTestCases
      Bug: 117606664
      Change-Id: I2ea9cd56861fcf280cab388a251aa53e618160e5
      535c5d2b
    • Lalit Maganti's avatar
    • Florian Mayer's avatar
      Property to enable heap profile from process startup. · 0f3decf2
      Florian Mayer authored
      This is world-readable so it can be checked in libc's process init.
      
      Test: m
      Test: flash sailfish
      
      Bug: 117821125
      
      Change-Id: Iac7317ceb75b5ad9cfb9adabdf16929263fa8a9d
      0f3decf2
    • Treehugger Robot's avatar
    • Hongyi Zhang's avatar
      allow system_server to read device_config_reset_performed_prop · d600c0c3
      Hongyi Zhang authored
      system server reads this property to keep track of whether server
      configurable flags have been reset during current boot.
      system server needs this information to decide whether to perform
      following disaster recovery actions on framework level.
      
      the get_prop added in this cl in system_server.te is not grouped
      in the same place as the set_prop in system_server.te in another
      cl (https://android-review.googlesource.com/c/platform/system/sepolicy/+/828284).
      This is because these 2 properties are serving for different purposes:
      device_config_flags_health_check_prop is used to control features(so will be
      all the future set_prop added by other feature teams under "# server configurable flags properties"),
      while device_config_reset_performed_prop is used by our API's internal implementation.
      So I feel like it might be clearer if I put this get_prop in a different place rather than
      appending to "# server configurable flags properties".
      
      Test: build suceeded.
      
      Change-Id: I64379aa8f0bbe093969b98d62093696a32aabe59
      d600c0c3
    • Haibo Huang's avatar
      Add new cpu variant related rules to SELinux · 544a0d54
      Haibo Huang authored
      I added ro.bionic.(2nd_)?_(arch|cpu_variant) to vendor system
      properties. And have init to write them to files under dev/.
      
      This change set SELinux rules for these properties and files.
      
      For the system properties: vendor/default.prop will set them. init will
      read them.
      For the files /dev/cpu_variant:.*: init will write them. bionic libc
      will read them. (Basically world readable).
      
      This is to allow libc select the right optimized routine at runtime.
      Like memcpy / strcmp etc.
      
      Test: getprop to make sure the properties are set.
      Test: ls -laZ to make sure /dev/cpu_variant:.* are correctly labeled.
      
      Change-Id: I41662493dce30eae6d41bf0985709045c44247d3
      544a0d54
    • Hongyi Zhang's avatar
    • Treehugger Robot's avatar
      b1f6942c
  2. Nov 18, 2018
  3. Nov 17, 2018
    • Nicolas Geoffray's avatar
      Allow zygote to JIT. · 6949a392
      Nicolas Geoffray authored
      bug: 110870380
      Test: device boots, artificially creating a rwx mapping in zygote works.
      
      Change-Id: I81a32b616a68f186867af25528a0348d1ad73a50
      6949a392
    • Bruno Martins's avatar
      sepolicy: Grant mediaextractor access to files over all types of sdcard fs · 7bff13f9
      Bruno Martins authored
       * Account for all possible sdcard-related filesystem types and not only
         sdcardfs:
      
         public/file.te:108:type fuse, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:109:type sdcardfs, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:111:type vfat, sdcard_type, fs_type, mlstrustedobject;
         public/file.te:112:type exfat, sdcard_type, fs_type, mlstrustedobject;
      
      Change-Id: Ic508397bf4ca66a002ada33ac3f600c17b8a1a10
      7bff13f9
    • Jiyong Park's avatar
      Allow domain to getattr on apex_mnt_dir · b1feedc2
      Jiyong Park authored
      The dynamic linker calls realpath(3) on paths found in the linker config
      script. Since realpath() calls lstat() on the parent paths, not allowing
      getattr on /apex and its subdirectories will cause selinux denial spam
      whenever something is executed from APEXes.
      
      Silence the spam by allowing getattr on apex_mnt_dir.
      
      Bug: 117403679
      Bug: 115787633
      Test: m apex.test; m; device is bootable
      
      Change-Id: Ic659582760a3ae146e73770266bc64332b36a97c
      b1feedc2
    • Treehugger Robot's avatar
      b16dcf5f
    • Nick Kralevich's avatar
      vold: remove access to /proc/net files · 1c5d223b
      Nick Kralevich authored
      The auditallow added in commit
      7a4af30b ("Start the process of locking
      down proc/net", May 04 2018), has not been triggered. This is safe to
      delete.
      
      Test: Policy compiles
      Test: no collected SELinux denials
      Bug: 68016944
      Change-Id: Ib45519b91742d09e7b93bbaf972e558848691a80
      1c5d223b
    • Tri Vo's avatar
      Remove redundant cgroup type/labelings. · d918c8df
      Tri Vo authored
      cgroup is labeled from genfs_contexts. Also, cgroup filesystems can't be
      context mounted, i.e. it's not possible to mount them with a label other
      than "cgroup".
      
      Bug: 110962171
      Test: m selinux_policy
      Test: boot aosp_walleye
      Change-Id: I8319b10136c42a42d1edaee47b77ad1698e87f2c
      d918c8df
    • Tri Vo's avatar
      fe14d483
    • Tri Vo's avatar
      Audit /dev access that might no longer be needed after Treble · 3e098089
      Tri Vo authored
      Bug: 110962171
      Test: boot aosp_walleye, aosp_blueline, no log spam from new audit
      Change-Id: Ibeeb317e2cf15584395e3dbb73eb01b827e19a09
      3e098089
    • Treehugger Robot's avatar
      c2f8f67b
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  4. Nov 16, 2018
  5. Nov 15, 2018
Loading