Skip to content
Snippets Groups Projects
  • Stephen Smalley's avatar
    54e9bc45
    Dependencies for new goldfish service domains. · 54e9bc45
    Stephen Smalley authored
    
    In order to support the new goldfish service domains in
    a change with the same Change-Id for the build project, we need
    the following changes in external/sepolicy:
    - /system/bin/logcat needs its own type so that it can be used as an
    entrypoint for the goldfish-logcat service.  A neverallow rule prevents
    us from allowing entrypoint to any type not in exec_type.
    - The config. and dalvik. property namespaces need to be labeled
    with something other than default_prop so that the qemu-props
    service can set them.  A neverallow rule prevents us from allowing
    qemu-props to set default_prop.
    
    We allow rx_file_perms to logcat_exec for any domain that
    was previously allowed read_logd() as many programs will read
    the logs by running logcat.  We do not do this for all domains
    as it would violate a neverallow rule on the kernel domain executing
    any file without transitioning to another domain, and as we ultimately
    want to apply the same restriction to the init domain (and possibly others).
    
    Change-Id: Idce1fb5ed9680af84788ae69a5ace684c6663974
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    54e9bc45
    History
    Dependencies for new goldfish service domains.
    Stephen Smalley authored
    
    In order to support the new goldfish service domains in
    a change with the same Change-Id for the build project, we need
    the following changes in external/sepolicy:
    - /system/bin/logcat needs its own type so that it can be used as an
    entrypoint for the goldfish-logcat service.  A neverallow rule prevents
    us from allowing entrypoint to any type not in exec_type.
    - The config. and dalvik. property namespaces need to be labeled
    with something other than default_prop so that the qemu-props
    service can set them.  A neverallow rule prevents us from allowing
    qemu-props to set default_prop.
    
    We allow rx_file_perms to logcat_exec for any domain that
    was previously allowed read_logd() as many programs will read
    the logs by running logcat.  We do not do this for all domains
    as it would violate a neverallow rule on the kernel domain executing
    any file without transitioning to another domain, and as we ultimately
    want to apply the same restriction to the init domain (and possibly others).
    
    Change-Id: Idce1fb5ed9680af84788ae69a5ace684c6663974
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>