Skip to content
Snippets Groups Projects
  1. Oct 11, 2018
    • Tri Vo's avatar
      Constrain cgroups access. · f55c989d
      Tri Vo authored
      What changed:
      - Removed cgroup access from untrusted and priv apps.
      - Settings app writes to /dev/stune/foreground/tasks, so system_app domain
      retains access to cgroup.
      - libcutils exports API to /dev/{cpuset, stune}/*. This API seems to be used
      abundantly in native code. So added a blanket allow rule for (coredomain - apps)
      to access cgroups.
      - For now, only audit cgroup access from vendor domains. Ultimately, we want to
      either constrain vendor access to individual domains or, even better, remove
      vendor access and have platform manage cgroups exclusively.
      
      Changes from original aosp/692189 which was reverted:
      - There seem to be spurious denials from vendor-specific apps. So added
      back access from { appdomain -all_untrusted_apps -priv_app } to cgroup.
      Audit this access with intent to write explicit per-domain rules for it.
      
      Bug: 110043362
      Test: adb shell setprop ro.config.per_app_memcg true, device correctly populates
      /dev/memcg on a per app basis on a device that supports that.
      Test: aosp_sailfish, wahoo boot without cgroup denials
      This reverts commit cacea25e.
      Change-Id: I05ab404f348a864e8409d811346c8a0bf49bc47a
      f55c989d
  2. Oct 10, 2018
  3. Oct 09, 2018
    • Tri Vo's avatar
      Constrain cgroups access. · 9899568f
      Tri Vo authored
      What changed:
      - Removed cgroup access from untrusted and priv apps.
      - Settings app writes to /dev/stune/foreground/tasks, so system_app domain
      retains access to cgroup.
      - libcutils exports API to /dev/{cpuset, stune}/*. This API seems to be used
      abundantly in native code. So added a blanket allow rule for (coredomain - apps)
      to access cgroups.
      - For now, only audit cgroup access from vendor domains. Ultimately, we want to
      either constrain vendor access to individual domains or, even better, remove
      vendor access and have platform manage cgroups exclusively.
      
      Bug: 110043362
      Test: adb shell setprop ro.config.per_app_memcg true, device correctly populates
      /dev/memcg on a per app basis on a device that supports that.
      Test: aosp_sailfish, wahoo boot without cgroup denials
      Change-Id: I9e441b26792f1edb1663c660bcff422ec7a6332b
      9899568f
    • Treehugger Robot's avatar
      77e40fbd
    • Nick Kralevich's avatar
      ioctl_defines: add encryption ioctls · 19d8ae9d
      Nick Kralevich authored
      Test: policy compiles
      Change-Id: I855ce7c706ebf11de8376b9f97b706d97419db4b
      19d8ae9d
    • Tom Cherry's avatar
    • Nick Kralevich's avatar
      ioctl_defines: Add F2FS ioctls · a605b04f
      Nick Kralevich authored
      Test: policy compiles.
      Change-Id: Icda25a34ce61c28fa2399a1f1f44c9ef7ba44745
      a605b04f
    • Nick Kralevich's avatar
      ioctl_defines: sort file · 61fce68d
      Nick Kralevich authored
      Sort file by ioctl name. This will make it hopefully easier to find
      entries.
      
      Alternatives considered: sorting file by ioctl value. This has the
      advantage that it's easier to map an SELinux ioctlcmd= avc message into
      a variable name, but would otherwise make this file harder to read.
      
      Test: policy compiles.
      Change-Id: I09b1dd4c055446f73185b90c4de5f3cdd98eb4b7
      61fce68d
    • jinhee0207.jo's avatar
      Add sepolicy labeling of wifi.concurrent.interface property. · 2b09698a
      jinhee0207.jo authored
      
      1. "Add sepolicy labeling of wifi.concurrent.interface" in property_contexts.
      wlan1 interface is added first in Pie OS. And wlan1 interface has getIfaceName
      by property_get in wifi_chip.cpp.
      (/hardware/interface/wifi/1.2/default/wifi_chip.cpp)
      But, there is no sepolicy about this interface. wlan0 and p2p0 is definitely specified.
      So, if we try to use wlan1, native sepolicy violation occurs.
      This is why this labeling is necessary.
      
      2. wlan1: Property labeling same with wlan0 or p2p0.
      wifi.interface u:object_r:exported_default_prop:s0 exact string
      
      Test: Basic Sanity - Verified tethering by using wlan1
      Bug: 117302656
      
      Change-Id: I24194bca7176e1927164228e6571870531a9bc56
      Signed-off-by: default avatarJinhee Jo <jinhee0207.jo@lge.com>
      2b09698a
  4. Oct 08, 2018
  5. Oct 07, 2018
  6. Oct 06, 2018
  7. Oct 05, 2018
  8. Oct 04, 2018
Loading