Skip to content
Snippets Groups Projects
  1. Jan 10, 2018
  2. Jan 09, 2018
  3. Jan 08, 2018
  4. Jan 05, 2018
  5. Jan 04, 2018
  6. Jan 03, 2018
  7. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
    • Jeff Vander Stoep's avatar
      webview_zygote: allow listing dirs in /system · 3588ddd0
      Jeff Vander Stoep authored
      For consistency with zygote, allow webview_zygote to list directories
      in /system.
      
      Test: Boot Taimen. Verify webiew_zygote denials during boot.
      Bug: 70857705
      Change-Id: I27eb18c377a5240d7430abf301c1c3af61704d59
      3588ddd0
    • Chenbo Feng's avatar
      sepolicy: Allow system server to r/w the bpf maps · 756dd574
      Chenbo Feng authored
      The system server is responsible for providing the network traffic
      stats to Apps and services. Allow it to directly reading the eBPF maps
      that stored these information can make the process of getting traffic
      stats simplier.
      
      Test: No selinux rule violation of system server reading netd bpf object
      Bug: 30950746
      Change-Id: I6d9438d1ed7c9bab45a708f5d2a85eb22f5e8170
      756dd574
    • Chenbo Feng's avatar
      sepolicy: New sepolicy classes and rules about bpf object · 08f92f9c
      Chenbo Feng authored
      Add the new classes for eBPF map and program to limit the access to eBPF
      object. Add corresponding rules to allow netd module initialize bpf
      programs and maps, use the program and read/wirte to eBPF maps.
      
      Test: no bpf sepolicy violations when device boot
      Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
      08f92f9c
    • Chenbo Feng's avatar
      sepolicy: Allow mount cgroupv2 and bpf fs · 254ad0da
      Chenbo Feng authored
      Some necessary sepolicy rule changes for init process to create directory,
      mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
      and pin bpf object as files and read it back from file under the
      directory where bpf filesystem is mounted.
      
      Test: bpf maps show up under /sys/fs/bpf/
      Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
      254ad0da
    • Ricky Wai's avatar
      Add Network Watchlist data file selinux policy(Used in ConfigUpdater) · ff3b957e
      Ricky Wai authored
      Bug: 63908748
      Test: Able to boot
      Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
      ff3b957e
    • Treehugger Robot's avatar
  8. Dec 30, 2017
  9. Dec 29, 2017
  10. Dec 22, 2017
  11. Dec 21, 2017
    • Tri Vo's avatar
      system_server: search permission to all of sysfs. · ce8bc8b0
      Tri Vo authored
      This will allow system_server to perfom path resolution on paths like:
      /sys/devices/soc/800f000.qcom,spmi/spmi-0/spmi0-00/800f000.qcom,spmi:qcom,pm8998@0:qcom,pm8998_rtc/rtc
      
      Fixes this denial:
      avc: denied { search } for pid=947 comm=system_server
      name=800f000.qcom,spmi dev=sysfs ino=19891
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
      tclass=dir permissive=0 b/68003344
      
      Bug: 68003344
      Test: walleye boots without the denial above.
      Change-Id: Ib282395124c7f2f554681fcc713b9afe189f441c
      ce8bc8b0
Loading