Ricky Wai
7494cc133c
Add Network Watchlist data file selinux policy(Used in ConfigUpdater) am: ff3b957e63
am: 56a9edb19e
...
am: a70a3ca0ba
Change-Id: I208790e37ba208f72b02a5caf595d84b34dd8cb2
2018-01-02 18:29:22 +00:00
Ricky Wai
a70a3ca0ba
Add Network Watchlist data file selinux policy(Used in ConfigUpdater) am: ff3b957e63
...
am: 56a9edb19e
Change-Id: I16a99b4ada7adedefbcb4796cb33e61805526520
2018-01-02 18:25:47 +00:00
Ricky Wai
56a9edb19e
Add Network Watchlist data file selinux policy(Used in ConfigUpdater)
...
am: ff3b957e63
Change-Id: I7889127ebe538d2aaf0db9b887c991e3976e842a
2018-01-02 18:22:13 +00:00
Ricky Wai
ff3b957e63
Add Network Watchlist data file selinux policy(Used in ConfigUpdater)
...
Bug: 63908748
Test: Able to boot
Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
2018-01-02 18:16:46 +00:00
Andreas Gampe
ee80a1038a
Merge "Sepolicy: Introduce perfprofd binder service" am: 2f39276e3f
am: d695693d86
...
am: b4d216d6be
Change-Id: I73505db59fbb5fc0a75f98ebc7499e82ce12534d
2018-01-02 16:07:03 +00:00
Andreas Gampe
b4d216d6be
Merge "Sepolicy: Introduce perfprofd binder service" am: 2f39276e3f
...
am: d695693d86
Change-Id: I1381048faa3da43dc6e7ac666f6abb0d3f7301ff
2018-01-02 16:03:00 +00:00
Andreas Gampe
d695693d86
Merge "Sepolicy: Introduce perfprofd binder service"
...
am: 2f39276e3f
Change-Id: If8e02a3397a2f345940960d6c408d75f9cd14d89
2018-01-02 15:59:27 +00:00
Treehugger Robot
2f39276e3f
Merge "Sepolicy: Introduce perfprofd binder service"
2018-01-02 15:55:29 +00:00
Tri Vo
f34774dc3d
Merge "system_server: search permission to all of sysfs." am: 8d07a8d595
am: b6f04b57bf
...
am: cacb24d53c
Change-Id: Id58cf377dac765922aceba07f2d135b3ad9ca2cf
2017-12-30 05:06:06 +00:00
Tri Vo
cacb24d53c
Merge "system_server: search permission to all of sysfs." am: 8d07a8d595
...
am: b6f04b57bf
Change-Id: Iaa2159794c4df713d40b62eb4eafb9e94f96c760
2017-12-30 05:02:55 +00:00
Tri Vo
b6f04b57bf
Merge "system_server: search permission to all of sysfs."
...
am: 8d07a8d595
Change-Id: Ic3ff38e6a2c29ff1ee829bf759d9b3bc406bb64a
2017-12-30 04:59:09 +00:00
Treehugger Robot
8d07a8d595
Merge "system_server: search permission to all of sysfs."
2017-12-30 04:56:53 +00:00
Andreas Gampe
aa9711f82b
Sepolicy: Introduce perfprofd binder service
...
Add policy for the perfprofd binder service.
For now, only allow su to talk to it.
Test: m
Change-Id: I690f75460bf513cb326314cce633fa25453515d6
2017-12-28 17:31:21 -08:00
Steven Moreland
4c57d6f661
Merge "Remove sys/class/leds permissions from dumpstate." am: 0b6856f59b
am: f3bf89c682
...
am: 47eecb4c32
Change-Id: I2bfd54c68c26d393a80ee1ee0e2e00854f488999
2017-12-22 22:02:23 +00:00
Steven Moreland
47eecb4c32
Merge "Remove sys/class/leds permissions from dumpstate." am: 0b6856f59b
...
am: f3bf89c682
Change-Id: Ie624abb395a8c84975e675b12ed6067c3cfa4f8d
2017-12-22 21:57:42 +00:00
Steven Moreland
f3bf89c682
Merge "Remove sys/class/leds permissions from dumpstate."
...
am: 0b6856f59b
Change-Id: I7a46caf78de021df995c974e607629d69536b025
2017-12-22 21:52:13 +00:00
Treehugger Robot
0b6856f59b
Merge "Remove sys/class/leds permissions from dumpstate."
2017-12-22 21:47:01 +00:00
Steven Moreland
a00b74196e
Remove sys/class/leds permissions from dumpstate.
...
These are device specific.
Bug: 70846424
Test: bugreport
Change-Id: Ic22c972f1b09988a8eccf0823dd0d87fc0c0a1f7
2017-12-22 21:46:34 +00:00
Jeffrey Vander Stoep
678082147d
Revert "Audit app access to /proc/net/*"
...
This reverts commit 84f9685972
.
Fixes: 70874565
Reason for revert: massive logspam during phone calls.
Change-Id: If00e46535f71209eea999e4d5d499bf40a5f16fd
2017-12-21 20:05:26 -08:00
Tri Vo
ce8bc8b00e
system_server: search permission to all of sysfs.
...
This will allow system_server to perfom path resolution on paths like:
/sys/devices/soc/800f000.qcom,spmi/spmi-0/spmi0-00/800f000.qcom,spmi:qcom,pm8998@0:qcom,pm8998_rtc/rtc
Fixes this denial:
avc: denied { search } for pid=947 comm=system_server
name=800f000.qcom,spmi dev=sysfs ino=19891
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir permissive=0 b/68003344
Bug: 68003344
Test: walleye boots without the denial above.
Change-Id: Ib282395124c7f2f554681fcc713b9afe189f441c
2017-12-21 22:35:27 +00:00
Joel Galenson
df80940892
Merge "Disallow most coredomains from accessing vendor_files on Treble." am: 6168a12ea9
am: ea3942f0a7
...
am: 6771dc79ef
Change-Id: Ic563be5ceca453ec9a7489ca462f240bfd0b03c3
2017-12-21 20:56:56 +00:00
Joel Galenson
6771dc79ef
Merge "Disallow most coredomains from accessing vendor_files on Treble." am: 6168a12ea9
...
am: ea3942f0a7
Change-Id: I67615fa3fac8c88647e4e085269ad30405010c8c
2017-12-21 19:53:12 +00:00
Joel Galenson
ea3942f0a7
Merge "Disallow most coredomains from accessing vendor_files on Treble."
...
am: 6168a12ea9
Change-Id: Ie83d270b7fb1659d890e5dd9356ee69a0b6f6ea5
2017-12-21 19:03:24 +00:00
Tri Vo
b5b1314ba7
system_server: remove access to /sys/class/leds. am: 89a7b21541
am: ef3865076b
...
am: 6f31c4b2d4
Change-Id: I745e51180d4b405c99c540f5e479c71a05794b01
2017-12-21 17:48:10 +00:00
Treehugger Robot
6168a12ea9
Merge "Disallow most coredomains from accessing vendor_files on Treble."
2017-12-21 17:07:20 +00:00
Tri Vo
6f31c4b2d4
system_server: remove access to /sys/class/leds. am: 89a7b21541
...
am: ef3865076b
Change-Id: I5cf091be44cdab57a17fd064b7ba4eca768314bc
2017-12-20 21:42:32 +00:00
Tri Vo
ef3865076b
system_server: remove access to /sys/class/leds.
...
am: 89a7b21541
Change-Id: Icdd87b3f76ebcbd5d05ad17f00368ef50fa1603d
2017-12-20 21:22:10 +00:00
Tri Vo
89a7b21541
system_server: remove access to /sys/class/leds.
...
Removing legacy rules. system_server now depends on Lights HAL (which
has its own domain) instead of /sys/class/leds.
Bug: 70846424
Test: sailfish boots; screen, flashlight work fine.
Change-Id: I6f116a599cab26ae71e45f462b33328bc8d43db5
2017-12-20 18:51:26 +00:00
Joel Galenson
52e11be07a
Disallow most coredomains from accessing vendor_files on Treble.
...
Test: Built the policy for many devices.
Change-Id: Ic61023dc2d597865504d1a4bc955bd1bc973f83c
2017-12-20 10:05:35 -08:00
Jeff Vander Stoep
7838cbff17
Merge "app: move appdomain to public policy" am: d4bb9b7342
am: 9a07f54ff7
...
am: a139dd2d61
-s ours
Change-Id: I2214f71f964f4536bc70c91abbbfa35aad9ba2df
2017-12-20 18:02:54 +00:00
Jeff Vander Stoep
a139dd2d61
Merge "app: move appdomain to public policy" am: d4bb9b7342
...
am: 9a07f54ff7
Change-Id: I4e84b7164fa29628852a2ba07775dac7b92a4899
2017-12-20 17:56:21 +00:00
Jeff Vander Stoep
9a07f54ff7
Merge "app: move appdomain to public policy"
...
am: d4bb9b7342
Change-Id: I00f508e57619f3f5273095bd8e1c9cae84fa2aaf
2017-12-20 17:53:48 +00:00
Treehugger Robot
d4bb9b7342
Merge "app: move appdomain to public policy"
2017-12-20 17:49:31 +00:00
Tri Vo
298e188b36
Merge "init: tighten sysfs_type permissions" am: 021344cc51
am: 677a6b2ecc
...
am: ea687901d0
Change-Id: Ic8c50bf2ed16b33acdea8a44ae944c9b6a50f6ae
2017-12-20 17:21:37 +00:00
Tri Vo
ea687901d0
Merge "init: tighten sysfs_type permissions" am: 021344cc51
...
am: 677a6b2ecc
Change-Id: I3f956384f5221ace3ce5d5b7475b16a612bd6484
2017-12-20 17:18:37 +00:00
Tri Vo
677a6b2ecc
Merge "init: tighten sysfs_type permissions"
...
am: 021344cc51
Change-Id: I6eb661d22f49cd9209f3b33075d04479184735fb
2017-12-20 17:16:02 +00:00
Tri Vo
021344cc51
Merge "init: tighten sysfs_type permissions"
2017-12-20 17:11:10 +00:00
Tony Mak
e3b6b7a556
Add selinux policy for CrossProfileAppsService am: 215fb3efe4
am: 5c98a06f1d
...
am: 17a7819801
-s ours
Change-Id: I127336f48afd31a846705bc87ca7d915d164e1bb
2017-12-20 07:06:17 +00:00
Tony Mak
17a7819801
Add selinux policy for CrossProfileAppsService am: 215fb3efe4
...
am: 5c98a06f1d
Change-Id: I07bbb517dc6d26b6044f4972eedc179643e72267
2017-12-20 07:03:44 +00:00
Tony Mak
5c98a06f1d
Add selinux policy for CrossProfileAppsService
...
am: 215fb3efe4
Change-Id: I6c451967c7e40250c29c7f696f61b4b61c27ad69
2017-12-20 07:01:12 +00:00
Jeff Vander Stoep
77b290f303
app: move appdomain to public policy
...
Vendor-specific app domains depend on the rules in app.te so they
must reside in public policy.
Bug: 70517907
Test: build
Change-Id: If45557a5732a06f78c752779a8182e053beb25a2
Merged-In: If45557a5732a06f78c752779a8182e053beb25a2
(cherry picked from commit 1f4cab8bd4
)
2017-12-19 21:31:01 -08:00
Jeffrey Vander Stoep
8cba16480a
Merge "app: move appdomain to public policy"
2017-12-20 05:20:14 +00:00
Tony Mak
215fb3efe4
Add selinux policy for CrossProfileAppsService
...
CrossProfileAppsService allows apps to do limited cross profile
operations, like checking the caller package is installed in
the specified user. It is similar to LauncherAppsService in some sense.
Merged-In: I26e383a57c32c4dc9b779752b20000b283a5bfdc
Change-Id: I26e383a57c32c4dc9b779752b20000b283a5bfdc
Fix: 67765768
Test: Built with ag/3063260. Can boot and verified those APIs are working.
(cherry picked from commit 6536c9e092
)
2017-12-20 09:42:37 +09:00
Tri Vo
55039509fd
init: tighten sysfs_type permissions
...
Removes open, read, setattr permissions to sysfs_type.
Adds explicit permissions to:
sysfs_dt_firmware_android
sysfs_vibrator
sysfs_wake_lock
Bug: 65643247
Test: walleye boots without denials to sysfs_type.
Change-Id: I2e344831655c2c8e8e48b07ecce6a2704f2a206a
2017-12-19 16:17:42 -08:00
yro
f10ff7df29
Setting up SELinux policy for statsd and stats service am: 2970845577
am: c9bfbc1686
...
am: e63570c375
Change-Id: Ia2aaaec0f28a94ff697acb3185d6717c6287247a
2017-12-19 19:31:17 +00:00
yro
e63570c375
Setting up SELinux policy for statsd and stats service am: 2970845577
...
am: c9bfbc1686
Change-Id: Ia73d1db9eb3e616b061f3365a228d0c7b7a926cb
2017-12-19 19:11:58 +00:00
yro
c9bfbc1686
Setting up SELinux policy for statsd and stats service
...
am: 2970845577
Change-Id: Ib8c8a55ffe51b48eced90683192f6025a0ab15ec
2017-12-19 18:56:05 +00:00
Jeff Vander Stoep
1f4cab8bd4
app: move appdomain to public policy
...
Vendor-specific app domains depend on the rules in app.te so they
must reside in public policy.
Bug: 70517907
Test: build
Change-Id: If45557a5732a06f78c752779a8182e053beb25a2
2017-12-19 08:19:52 -08:00
yro
2970845577
Setting up SELinux policy for statsd and stats service
...
Bug: 63757906
Test: manual testing conducted
Change-Id: Id03413ce82b5646d4bceddc59e16c7d5ee5bc193
2017-12-19 01:41:48 +00:00
Tri Vo
a4bb05fdbe
Merge "perfprofd: allow traversing sysfs directories." am: b73cd9f8df
am: 2ee1a51c3c
...
am: 9ee60ea4a7
Change-Id: Id96db4ee34885791e183af2a09f9fb9244ff626a
2017-12-19 01:19:21 +00:00