Skip to content
Snippets Groups Projects
  1. Jan 23, 2019
    • Siarhei Vishniakou's avatar
      Permissions for input_native_boot flags · c0c91555
      Siarhei Vishniakou authored
      For input experiments that are enabled at boot time, allow system_server
      to read and write the device config flags.
      
      Bug: 120794829
      Test: presubmit
      Change-Id: I0f075a7579c593d4e07c3e31be529e34554068a6
      c0c91555
  2. Jan 22, 2019
  3. Jan 21, 2019
    • Martijn Coenen's avatar
      Initial sepolicy for app_zygote. · 1bbda7e6
      Martijn Coenen authored
      The application zygote is a new sort of zygote process that is a
      child of the regular zygote. Each application zygote is tied to the
      application for which it's launched. Once it's started, it will
      pre-load some of the code for that specific application, much like
      the regular zygote does for framework code.
      
      Once the application zygote is up and running, it can spawn
      isolated service processes that run in the isolated_app domain. These
      services can then benefit from already having the relevant
      application code and data pre-loaded.
      
      The policy is largely the same as the webview_zygote domain,
      however there are a few crucial points where the policy is different.
      
      1) The app_zygote runs under the UID of the application that spawned
         it.
      2) During app_zygote launch, it will call a callback that is
         controlled by the application, that allows the application to
         pre-load code and data that it thinks is relevant.
      
      Especially point 2 is imporant: it means that untrusted code can run
      in the app_zygote context. This context is severely limited, and the
      main concern is around the setgid/setuid capabilities. Those conerns
      are mitigated by installing a seccomp filter that only allows
      setgid/setuid to be called in a safe range.
      
      Bug: 111434506
      Test: app_zygote can start and fork children without denials.
      Change-Id: I1cc49ee0042d41e5ac6eb81d8f8a10ba448d4832
      1bbda7e6
  4. Jan 19, 2019
    • Tri Vo's avatar
      Split mapping file into system and product parts · 937e6649
      Tri Vo authored
      Both mapping files need to be included when building sepolicy at boot
      time.
      
      Bug: 119305624
      Test: boot taimen
      Test: "cnd" type is declared in /vendor; "dataservice_app" type is
      declared in /product. This permission is preserved
      "allow cnd dataservice_app:binder { transfer call };"
      Change-Id: I138f34208ea05e170defd2b4ef4700ffa81f9573
      937e6649
    • Tri Vo's avatar
      Rename plat_pub_policy -> pub_policy · e68ba59f
      Tri Vo authored
      Public policy that is available to vendor (and odm) sepolicy is a
      combination of system and product public sepolicy. Since "plat_" prefix
      implies a pure system sepolicy component, drop "plat_" prefix from
      "plat_pub_policy" to be consistent with naming in this file.
      
      Bug: 119305624
      Test: m selinux_policy
      Change-Id: Iaf094702556ce97371fa1c58c01d707103d7f7d6
      e68ba59f
    • Tri Vo's avatar
      Remove obsolete mapping build rules. · 8a2b6524
      Tri Vo authored
      Mapping files for previous releases are unconditionally packaged on the
      device. No need to account for case when BOARD_SEPOLICY_VERS and
      PLATFORM_SEPOLICY_VERSION are different.
      
      Bug: 119305624
      Test: m selinux_policy
      Change-Id: I36c3c43f96870d9a71adf91c8fb8926587c5a50e
      8a2b6524
  5. Jan 18, 2019
  6. Jan 17, 2019
  7. Jan 16, 2019
    • Martijn Coenen's avatar
      Allow the kernel to read staging_data_file. · b85acbb8
      Martijn Coenen authored
      These are APEX files in /data/staging, and will be accessed by the loop
      driver in the kernel.
      
      Bug: 118865310
      Test: no denials on emulator
      Change-Id: I5c849b6677566cb00d28011352b9dc6b787a0bc4
      b85acbb8
    • Nick Kralevich's avatar
      rs.te: Remove dontaudit statements · 80eec389
      Nick Kralevich authored
      These dontaudit rules were in place to suppress SELinux denials due to
      file descriptor leakage. The file descriptor leakage has been fixed, so
      these rules are no longer necessary. Delete.
      
      Fixes: 120983106
      Test: cts-tradefed run cts-dev -m CtsRenderscriptTestCases
      Change-Id: I5cad79c3526583bd2b65bd089fee9c490f6beb5e
      80eec389
    • Treehugger Robot's avatar
      2b805595
    • Narayan Kamath's avatar
      Add initial sepolicy for app data snapshots. · 2ad229c7
      Narayan Kamath authored
      Define a rollback_data_file label and apply it to the snapshots
      directory. This change contains just enough detail to allow
      vold_prepare_subdirs to prepare these directories correctly.
      
      A follow up change will flesh out the access policy on these
      directories in more detail.
      
      Test: make, manual
      Bug: 112431924
      
      Change-Id: I4fa7187d9558697016af4918df6e34aac1957176
      2ad229c7
    • lifr's avatar
      Allow netd to write to statsd · 980c08c9
      lifr authored
      config sepolicy to allow netd to write to statsd.
      
      Test: run runtests.sh, make sure no missing test and get all pass
            run /out/host/linux-x86/bin/statsd_testdrive 82
            Got following metric data dump:pass for local test
      Bug: 119862317
      
      Change-Id: Ieff5ca55de46715d54ef57c4a6d144fd7d03e4b7
      980c08c9
Loading