Skip to content
Snippets Groups Projects
  1. Jan 03, 2018
  2. Jan 02, 2018
    • Jeff Vander Stoep's avatar
      webview_zygote: allow listing dirs in /system · 3588ddd0
      Jeff Vander Stoep authored
      For consistency with zygote, allow webview_zygote to list directories
      in /system.
      
      Test: Boot Taimen. Verify webiew_zygote denials during boot.
      Bug: 70857705
      Change-Id: I27eb18c377a5240d7430abf301c1c3af61704d59
      3588ddd0
    • Chenbo Feng's avatar
      sepolicy: Allow system server to r/w the bpf maps · 756dd574
      Chenbo Feng authored
      The system server is responsible for providing the network traffic
      stats to Apps and services. Allow it to directly reading the eBPF maps
      that stored these information can make the process of getting traffic
      stats simplier.
      
      Test: No selinux rule violation of system server reading netd bpf object
      Bug: 30950746
      Change-Id: I6d9438d1ed7c9bab45a708f5d2a85eb22f5e8170
      756dd574
    • Chenbo Feng's avatar
      sepolicy: New sepolicy classes and rules about bpf object · 08f92f9c
      Chenbo Feng authored
      Add the new classes for eBPF map and program to limit the access to eBPF
      object. Add corresponding rules to allow netd module initialize bpf
      programs and maps, use the program and read/wirte to eBPF maps.
      
      Test: no bpf sepolicy violations when device boot
      Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
      08f92f9c
    • Chenbo Feng's avatar
      sepolicy: Allow mount cgroupv2 and bpf fs · 254ad0da
      Chenbo Feng authored
      Some necessary sepolicy rule changes for init process to create directory,
      mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
      and pin bpf object as files and read it back from file under the
      directory where bpf filesystem is mounted.
      
      Test: bpf maps show up under /sys/fs/bpf/
      Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
      254ad0da
    • Ricky Wai's avatar
      Add Network Watchlist data file selinux policy(Used in ConfigUpdater) · ff3b957e
      Ricky Wai authored
      Bug: 63908748
      Test: Able to boot
      Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
      ff3b957e
    • Treehugger Robot's avatar
  3. Dec 30, 2017
  4. Dec 29, 2017
  5. Dec 22, 2017
  6. Dec 21, 2017
    • Tri Vo's avatar
      system_server: search permission to all of sysfs. · ce8bc8b0
      Tri Vo authored
      This will allow system_server to perfom path resolution on paths like:
      /sys/devices/soc/800f000.qcom,spmi/spmi-0/spmi0-00/800f000.qcom,spmi:qcom,pm8998@0:qcom,pm8998_rtc/rtc
      
      Fixes this denial:
      avc: denied { search } for pid=947 comm=system_server
      name=800f000.qcom,spmi dev=sysfs ino=19891
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
      tclass=dir permissive=0 b/68003344
      
      Bug: 68003344
      Test: walleye boots without the denial above.
      Change-Id: Ib282395124c7f2f554681fcc713b9afe189f441c
      ce8bc8b0
    • Treehugger Robot's avatar
  7. Dec 20, 2017
  8. Dec 19, 2017
  9. Dec 18, 2017
    • xshu's avatar
      Wifi hal - Firmware dump permissions · 6ad3c891
      xshu authored
      we are aiming to improve logging performance by having wifi hal
      directly write to the flash.
      
      Wifi hal need to be able to create, write, and delete files in
      a directory. This will be restricted to userdebug and eng builds only.
      
      Bug: 70170285
      Test: compile, run on device
      Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
      6ad3c891
  10. Dec 16, 2017
  11. Dec 15, 2017
  12. Dec 14, 2017
    • Tri Vo's avatar
      perfprofd: allow traversing sysfs directories. · ae207915
      Tri Vo authored
      Bug: 70275668
      Test: walleye builds, boots.
      This change only expands the existing permissions, so shouldn't regress
      runtime behavior.
      Change-Id: I36e63f11d78998a88e3f8d1e6913e20762a359af
      ae207915
  13. Dec 13, 2017
  14. Dec 12, 2017
  15. Dec 11, 2017
    • Jeff Vander Stoep's avatar
      Restore recovery's ability to format cache and preserve logs · 87dd195b
      Jeff Vander Stoep authored
      Commit b8b4f5d6 'Clean up old file-based OTA SELinux rules' removed
      many permissions from recovery, a few of which are still required.
      Restore these.
      
      [ 2918.409108] type=1400 audit(2327427.540:159): avc:  denied
      { search } for  pid=339 comm="recovery" name="/" dev="mmcblk0p38"
      ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      [ 2586.563071] E:Failed to mount / create /cache/recovery: Permission
      denied
      [ 2586.780320] E:Can't open /cache/recovery/log: Permission denied
      [ 2586.850399] E:Can't open /cache/recovery/last_log: Permission
      denied
      [ 2586.918979] E:Can't open /cache/recovery/last_install: Permission
      denied
      
      [   54.035867] type=1400 audit(59206654.526:12): avc:  denied  { chown }
      for  pid=330 comm="recovery" capability=0  scontext=u:r:recovery:s0
      tcontext=u:r:recovery:s0 tclass=capability permissive=0a
      
      Bug: 70350029
      Test: xunchang to test
      Change-Id: I46ab049b8eb600b44c84a61777fade150cadd197
      87dd195b
    • Tri Vo's avatar
      Remove access to 'sysfs' files from healtd and charger. · d276b434
      Tri Vo authored
      We rely on vendors to label all dependencies of healthd/charger under
      /sys/class/power_supply with sysfs_batteryinfo type.
      
      Bug: 65643247
      Bug: 32659667
      Test: boots without denials from healthd, to sysfs_batteryinfo or to
      sysfs_msm_subsys.
      Test: charging with device turned off works without /sys denials.
      
      Change-Id: I893f309ecad8a0caf7d0b81f5f945725907255c2
      d276b434
Loading