Skip to content
Snippets Groups Projects
  1. Dec 21, 2016
  2. Dec 20, 2016
  3. Dec 19, 2016
    • Nick Kralevich's avatar
      priv_app.te: drop app_data_file:file execute_no_trans; · 8fb4cb8b
      Nick Kralevich authored
      auditallow (added in commit 758e6b36)
      has been in place for about 2 weeks now, and no hits. Remove
      execute_no_trans.
      
      The net effect of this change is that priv_apps won't be able to exec()
      a file from their home directory, but dlopen() and friends will still
      work.
      
      Test: Compiles and boots successfully.
      Test: No auditallow messages received via SELinux denial collection.
      Change-Id: I60fcdc260d12e1bcc2355ca4dd912de7e6d0a145
      8fb4cb8b
    • Alex Klyubin's avatar
      Clarify what determines precedence rules in seapp_contexts · e392020b
      Alex Klyubin authored
      Test: It's a comment -- no impact on build
      Change-Id: Ibd7ff0dcd9d4c3d526ca20ab35dd4bac70d14f0a
      e392020b
    • Allen Hair's avatar
      Add coverage service. · 2328fec7
      Allen Hair authored
      Bug: 31077138
      Test: Device boots, coverage service works when tested manually.
      Change-Id: Ia855cfefd5c25be5d1d8db48908c04b3616b5504
      2328fec7
  4. Dec 17, 2016
  5. Dec 16, 2016
  6. Dec 15, 2016
  7. Dec 14, 2016
    • Nick Kralevich's avatar
      Assign a label to the ro.boottime.* properties · bb9a3888
      Nick Kralevich authored
      system/core commit 331cf2fb7c16b5b25064f8d2f00284105a9b413f created a
      number of new properties of the form:
      
        [ro.boottime.init]: [5294587604]
        [ro.boottime.InputEventFind]: [10278767840]
        [ro.boottime.adbd]: [8359267180]
        ...
      
      These properties were assigned the default_prop SELinux label because a
      better label did not exist. Properties labeled with the default_prop
      label are readable to any SELinux domain, which is overly broad.
      
        bullhead:/ $ getprop -Z ro.boottime.adbd
        u:object_r:default_prop:s0
      
      Instead, create a new label for the ro.boottime.* properties so we can
      apply more fine grain read access control to these properties.
      
        bullhead:/ $ getprop -Z ro.boottime.adbd
        u:object_r:boottime_prop:s0
      
      New SELinux property labels have minimal permissions by default. As a
      result, after this change, ro.boottime.* properties will only be
      readable to system_server, bootstat, init (because it manages the property
      space), and "adb root" (because no SELinux permissions are enforced there).
      
      Additional read access can be granted as-needed.
      
      This is part of a larger effort to implement fine-grain access control
      on the properties managed by init.
      
      Test: Device boots and no SELinux denials on boot.
      Change-Id: Ibf981cb81898f4356fdc5c1b6f15dd93c0d6d84d
      bb9a3888
    • Chad Brubaker's avatar
      Allow binder IPC between ephemeral app and appdomain · 641d5d8f
      Chad Brubaker authored
      Address denial type=1400 audit(0.0:42): avc: denied { call } for
      scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:r:ephemeral_app:s0:c207,c258,c512,c768 tclass=binder
      
      Test: Above denial no longer happens
      Change-Id: I351269ee4671cfd51c981d3db5d0f3944d14e702
      641d5d8f
    • Treehugger Robot's avatar
    • Steven Moreland's avatar
      All hal policies expressed as attributes. · 29eed9fa
      Steven Moreland authored
      Bug: 32123421
      Bug: 32905206
      
      Test: compiles, nfc works
      Change-Id: Ibf72ef70255573e4df0863ea640354b3c37eb47d
      29eed9fa
    • Nick Kralevich's avatar
      Do not allow new additions to core_property_type · d310df20
      Nick Kralevich authored
      core_property_type is an attribute which was given to all existing
      properties known to core SELinux policy. Any property with this label is
      readable to all SELinux domains, which is overly broad. The long term
      goal is to remove the core_property_type attribute entirely.
      
      Add a neverallow rule prohibiting the introduction of new properties
      with the core_property_type attribute. Device specific properties, or
      new properties in core SELinux policy, should not have this attribute.
      
      Test: policy compiles
      Change-Id: Ie89a9f0d81c8561616001ff8451496ce2278dbb2
      d310df20
Loading