Skip to content
Snippets Groups Projects
  1. Dec 21, 2016
  2. Dec 20, 2016
  3. Dec 19, 2016
    • Nick Kralevich's avatar
      priv_app.te: drop app_data_file:file execute_no_trans; · 8fb4cb8b
      Nick Kralevich authored
      auditallow (added in commit 758e6b36)
      has been in place for about 2 weeks now, and no hits. Remove
      execute_no_trans.
      
      The net effect of this change is that priv_apps won't be able to exec()
      a file from their home directory, but dlopen() and friends will still
      work.
      
      Test: Compiles and boots successfully.
      Test: No auditallow messages received via SELinux denial collection.
      Change-Id: I60fcdc260d12e1bcc2355ca4dd912de7e6d0a145
      8fb4cb8b
    • Alex Klyubin's avatar
      Clarify what determines precedence rules in seapp_contexts · e392020b
      Alex Klyubin authored
      Test: It's a comment -- no impact on build
      Change-Id: Ibd7ff0dcd9d4c3d526ca20ab35dd4bac70d14f0a
      e392020b
    • Allen Hair's avatar
      Add coverage service. · 2328fec7
      Allen Hair authored
      Bug: 31077138
      Test: Device boots, coverage service works when tested manually.
      Change-Id: Ia855cfefd5c25be5d1d8db48908c04b3616b5504
      2328fec7
  4. Dec 17, 2016
  5. Dec 16, 2016
  6. Dec 15, 2016
  7. Dec 14, 2016
    • Nick Kralevich's avatar
      Assign a label to the ro.boottime.* properties · bb9a3888
      Nick Kralevich authored
      system/core commit 331cf2fb7c16b5b25064f8d2f00284105a9b413f created a
      number of new properties of the form:
      
        [ro.boottime.init]: [5294587604]
        [ro.boottime.InputEventFind]: [10278767840]
        [ro.boottime.adbd]: [8359267180]
        ...
      
      These properties were assigned the default_prop SELinux label because a
      better label did not exist. Properties labeled with the default_prop
      label are readable to any SELinux domain, which is overly broad.
      
        bullhead:/ $ getprop -Z ro.boottime.adbd
        u:object_r:default_prop:s0
      
      Instead, create a new label for the ro.boottime.* properties so we can
      apply more fine grain read access control to these properties.
      
        bullhead:/ $ getprop -Z ro.boottime.adbd
        u:object_r:boottime_prop:s0
      
      New SELinux property labels have minimal permissions by default. As a
      result, after this change, ro.boottime.* properties will only be
      readable to system_server, bootstat, init (because it manages the property
      space), and "adb root" (because no SELinux permissions are enforced there).
      
      Additional read access can be granted as-needed.
      
      This is part of a larger effort to implement fine-grain access control
      on the properties managed by init.
      
      Test: Device boots and no SELinux denials on boot.
      Change-Id: Ibf981cb81898f4356fdc5c1b6f15dd93c0d6d84d
      bb9a3888
Loading