- Jan 21, 2019
-
-
Ryan Savitski authored
This patch extends the current debug-specific rules to cover user builds. As a reminder, on user, the target process fork-execs a private heapprofd process, which then performs stack unwinding & talking to the central tracing daemon while staying in the target's domain. The central heapprofd daemon is only responsible for identifying targets & sending the activation signal. On the other hand, on debug, the central heapprofd can handle all processes directly, so the necessary SELinux capabilities depend on the build type. These rules are necessary but not sufficient for profiling. For zygote children, the libc triggering logic will also check for the app to either be debuggable, or go/profileable. For more context, see go/heapprofd-security & go/heapprofd-design. Note that I've had to split this into two separate macros, as exec_no_trans - which is necessary on user, but nice-to-have on debug - conflicts with a lot of neverallows (e.g. HALs and system_server) for the wider whitelisting that we do on debug builds. Test: built & flashed on {blueline-userdebug, blueline-user}, activated profiling of whitelisted/not domains & checked for lack of denials in logcat. Bug: 120409382 Change-Id: Id0defc3105b99f777bcee2046d9894a2b39c6a29
-
Martijn Coenen authored
The application zygote is a new sort of zygote process that is a child of the regular zygote. Each application zygote is tied to the application for which it's launched. Once it's started, it will pre-load some of the code for that specific application, much like the regular zygote does for framework code. Once the application zygote is up and running, it can spawn isolated service processes that run in the isolated_app domain. These services can then benefit from already having the relevant application code and data pre-loaded. The policy is largely the same as the webview_zygote domain, however there are a few crucial points where the policy is different. 1) The app_zygote runs under the UID of the application that spawned it. 2) During app_zygote launch, it will call a callback that is controlled by the application, that allows the application to pre-load code and data that it thinks is relevant. Especially point 2 is imporant: it means that untrusted code can run in the app_zygote context. This context is severely limited, and the main concern is around the setgid/setuid capabilities. Those conerns are mitigated by installing a seccomp filter that only allows setgid/setuid to be called in a safe range. Bug: 111434506 Test: app_zygote can start and fork children without denials. Change-Id: I1cc49ee0042d41e5ac6eb81d8f8a10ba448d4832
-
- Jan 18, 2019
-
-
Eric Holk authored
We will generate precompiled layouts as part of the package install or upgrade process. This means installd needs to be able to invoke viewcompiler. This change gives installd and viewcompiler the minimal set of permissions needed for this to work. Bug: 111895153 Test: manual Change-Id: Ic1fe60bd264c497b5f79d9e1d77c2da4e092377b
-
Treehugger Robot authored
-
Christian Wailes authored
-
Jeff Vander Stoep authored
This line always prints when building master branch, it's not particularly useful. system/sepolicy/Android.mk:77: warning: BOARD_SEPOLICY_VERS not specified, assuming current platform version Test: build Change-Id: I52f8dc2a77966bc0c21168b1339f3029185e5339
-
Narayan Kamath authored
-
Jeffrey Vander Stoep authored
-
Treehugger Robot authored
-
William Hester authored
-
- Jan 17, 2019
-
-
Jeff Vander Stoep authored
Test: build Change-Id: I2ea39c767264339e300fceeb23c506883d23a14c
-
Chris Wailes authored
This patch adds the necessary SELinux contexts for the blastula pool sockets. Topic: zygote-prefork Test: make & flash & check log for message Bug: 68253328 Change-Id: I46d62e5ab8c573cb7704feec2b1d42d91a990fd9
-
Treehugger Robot authored
-
Treehugger Robot authored
-
William Hester authored
The testharness service will manage Test Harness Mode and provide a command-line interface for users to enable Test Harness Mode; however it does not directly provide a public API. Bug: 80137798 Test: make Test: flash crosshatch Change-Id: Ie396e40fcea8914b4dd2247f2314e029b66ad84e
-
Treehugger Robot authored
-
Jaegeuk Kim authored
-
Nandana Dutt authored
-
Marissa Wall authored
IAllocator and IMappaer are being rev'd to 3.0. Update sepolicy to allow them to be used. Test: compile with allocator/mapper patches add boot the device Bug: 120493579 Change-Id: Id241c6bd79c02ec93d8dd415539f90a18f733d03
-
Primiano Tucci authored
iorapd needs to access these events on-device through perfetto. Bug: 122606712 Bug: 72170747 Change-Id: I819dc9b79e85c3e261859d125c680a50737351da
-
Narayan Kamath authored
Used to capture and restore app data snapshots as implemented in change I3e4d36c11e52fb885b585b1946e215cf986206fd. Test: make, manual Bug: 112431924 Change-Id: I1cd1ec3f9c93c4af65b662a5ada582299b595a8f
-
Primiano Tucci authored
Getting rid of the feature in aosp/874979. See other CL and bug for context. Bug: 122987614 Bug: 122987614 Test: run dumpstate before and after patch, file sizes are comparable, observed no tracing-related errors. Change-Id: Ifcde8dcbb99ce53d226b50ddd3178adaaa4322bd
-
Annie Meng authored
The backup system service will move its storage location to per-user CE directories to support multiple users. Add additional iterations on the existing rules to support the new location. /data/backup -> /data/system_ce/[user id]/backup Previously covered by rule backup_data_file /cache/backup -> /data/system_ce/[user id]/backup_stage Previously covered by rule cache_backup_file Also add support for vold to create and perform restorecon on the new locations. Example denials and detailed proposal in the doc on the linked bug. Bug: 121197420 Test: 1) Boot device; check dirs created with correct label; run backup successfully on system user 2) Create secondary user; check dirs created with correct label; run backup successfully Change-Id: I47faa69cd2a6ac55fb762edbf366a86d3b06ca77
-
Nandana Dutt authored
BUG:111441001 Test: boots Change-Id: I71a54e8335c5ce7f9d97af3dbbd62e663bb66d33
-
Annie Meng authored
-
Jaegeuk Kim authored
This allows fs_mgr in init to build loopback device and its control. Bug: 74582279 Change-Id: I039cd57d4638870a59dd38c952d3ab9b671be545 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
Frank Li authored
-
Treehugger Robot authored
-
- Jan 16, 2019
-
-
Martijn Coenen authored
These are APEX files in /data/staging, and will be accessed by the loop driver in the kernel. Bug: 118865310 Test: no denials on emulator Change-Id: I5c849b6677566cb00d28011352b9dc6b787a0bc4
-
Nick Kralevich authored
These dontaudit rules were in place to suppress SELinux denials due to file descriptor leakage. The file descriptor leakage has been fixed, so these rules are no longer necessary. Delete. Fixes: 120983106 Test: cts-tradefed run cts-dev -m CtsRenderscriptTestCases Change-Id: I5cad79c3526583bd2b65bd089fee9c490f6beb5e
-
Treehugger Robot authored
-
Narayan Kamath authored
Define a rollback_data_file label and apply it to the snapshots directory. This change contains just enough detail to allow vold_prepare_subdirs to prepare these directories correctly. A follow up change will flesh out the access policy on these directories in more detail. Test: make, manual Bug: 112431924 Change-Id: I4fa7187d9558697016af4918df6e34aac1957176
-
lifr authored
config sepolicy to allow netd to write to statsd. Test: run runtests.sh, make sure no missing test and get all pass run /out/host/linux-x86/bin/statsd_testdrive 82 Got following metric data dump:pass for local test Bug: 119862317 Change-Id: Ieff5ca55de46715d54ef57c4a6d144fd7d03e4b7
-
David Anderson authored
Bug: 122556707 Test: gsid starts Change-Id: Ib05ddb79051436f51cd236de04027a3b12ee87a9 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Jeff Vander Stoep authored
Access to zygote_socket is already neverallowed to { domain -system_server }. Test: build Change-Id: I6353ef09f769c8d64c97b1bdef93f0ab4d5dae6a
-
Wei Wang authored
-
Remi NGUYEN VAN authored
-
Tao Bao authored
avc: denied { ioctl } for pid=599 comm="mke2fs" path="/dev/block/sda13" dev="tmpfs" ino=18975 ioctlcmd=127b scontext=u:r:recovery:s0 tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file avc: denied { ioctl } for pid=587 comm="mke2fs" path="/dev/block/sda20" dev="tmpfs" ino=17931 ioctlcmd=0x127b scontext=u:r:recovery:s0 tcontext=u:object_r:metadata_block_device:s0 tclass=blk_file 0x127b (BLKPBSZGET) is called by mke2fs that queries physical sector size. Although the denial is currently non-fatal, as mke2fs falls back to use logical sector size, it might lead to undesired result in future. Test: Factory reset on taimen and blueline respectively. Change-Id: I14fc6593aeae309c79f5eadcffc8158b0a2ab2f6
-
- Jan 15, 2019
-
-
Tri Vo authored
-
Treehugger Robot authored
-