Skip to content
Snippets Groups Projects
  1. Mar 17, 2015
    • Dan Albert's avatar
      Revert "Fix sepolicy-analyze libc++.so loading issue w/CTS." · 0d3bf4be
      Dan Albert authored
      This is causing more harm than good. We'll just make these all link
      libc++ again and work out the CTS issues if they still exist.
      
      Bug: 19778891
      
      This reverts commit 3812cf58.
      
      Change-Id: Iaea8f6acb147da4275633a760ccb32951db7f8b6
      0d3bf4be
    • Dan Albert's avatar
      Revert "Don't use address sanitizer for selinux tools." · f0852340
      Dan Albert authored
      This is causing more harm than good. We'll just make these all link
      libc++ again (another revert) and work out the CTS issues if they still
      exist.
      
      Bug: 19778891
      
      This reverts commit a5113a15.
      
      Change-Id: I35a4c93dae4abb66e3525451d5ce01e33a540895
      f0852340
    • Dan Albert's avatar
      Don't use address sanitizer for selinux tools. · a5113a15
      Dan Albert authored
      Address sanitizer requires using libc++ (apparently). We removed
      libc++ from these projects since they were C and the SDK/CTS was not
      able to find libc++.
      
      If we're interested in continuing to use ASAN on these tools
      (probably), we should turn libc++ back on once we're sure CTS won't
      die.
      
      Bug: 19778891
      Change-Id: I3c1913171a15396ead73277ec1186fead730f66d
      a5113a15
  2. Mar 16, 2015
    • dcashman's avatar
      Fix sepolicy-analyze libc++.so loading issue w/CTS. · 3812cf58
      dcashman authored
      Addresses the following error when running CTS on master:
      junit.framework.AssertionFailedError: The following errors were encountered when validating the SELinuxneverallow rule:
      neverallow { appdomain -bluetooth } self:capability *;
      /tmp/SELinuxHostTest5593810182495331783.tmp: error while loading shared libraries: libc++.so: cannot open shared object file: No such file or directory
      
      Also indicate that none of the sepolicy tools need c++ std lib.
      
      Bug: 19617220
      
      Change-Id: I713b3cbd1220655413d399c7cd2b0b50459a5485
      3812cf58
    • Stephen Smalley's avatar
      Allow shell to read /proc/pid/attr/current for ps -Z. · d5892b4c
      Stephen Smalley authored
      
      Needed since Iff1e601e1268d4d77f64788d733789a2d2cd18cc removed it
      from appdomain.
      
      Change-Id: I9fc08b525b9868f0fb703b99b0c0c17ca8b656f9
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      d5892b4c
    • Stephen Smalley's avatar
      Remove ability to read all /proc/pid/attr/current entries. · 2cba1ee1
      Stephen Smalley authored
      
      This was rendered obsolete when SELinuxDomainTest was ported
      to SELinuxHostTest and only makes sense if allowing search
      to domain:dir and { open read } to domain:file in order to
      open the /proc/pid/attr/current files in the first place.
      SELinux applies a further :process getattr check when
      reading any of the /proc/pid/attr/* files for any process
      other than self, which is no longer needed by app domains to
      pass CTS.
      
      Change-Id: Iff1e601e1268d4d77f64788d733789a2d2cd18cc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      2cba1ee1
  3. Mar 14, 2015
  4. Mar 13, 2015
    • Stephen Smalley's avatar
      neverallow untrusted_app as a mlstrustedsubject. · eaece936
      Stephen Smalley authored
      
      Assigning mlstrustedsubject to untrusted_app would undermine
      the per-user isolation model being enforced via levelFrom=user
      in seapp_contexts and the mls constraints.  There is no direct
      way to specify a neverallow on attribute assignment, but this
      makes use of a particular property of the fork permission to
      prevent ever adding mlstrustedsubject to untrusted_app.
      
      A similar restriction for app_data_file and mlstrustedobject
      is also important for the same reason, but cannot be expressed
      as a neverallow.
      
      Change-Id: I5170cadc55cc614aef0cd5f6491de8f69a4fa2a0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      eaece936
    • Stephen Smalley's avatar
      Move allow rules before neverallow rules. · b8caf7fd
      Stephen Smalley authored
      
      There were a few instances where allow rules were appended
      after the neverallow rules stanza in the .te file.  Also
      there were some regular allow rules inserted into the CTS-specific
      rules section of app.te.  Just move the rules as appropriate.
      Should be no change in policy.
      
      Change-Id: Iec76f32d4b531d245bbf5dd9f621a71ff5c71f3e
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      b8caf7fd
    • Stephen Smalley's avatar
      sepolicy-analyze: Add attribute command. · 0233cd80
      Stephen Smalley authored
      
      Add an attribute command to sepolicy-analyze for displaying the list
      of types associated with an attribute in a policy.  This is for use
      by CTS to check what domains and types are associated with certain
      attributes such as mlstrustedsubject and mlstrustedobject.
      
      Change-Id: Ie19361c02feb1ad14ce36862c6aace9e66c422bb
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      0233cd80
    • Stephen Smalley's avatar
      Fix rules for general_property_contexts. · c9361731
      Stephen Smalley authored
      
      Failed to include base_rules.mk, so this target was not being built.
      
      Change-Id: I2414fa6c3e3e37c74f63c205e3694d1a811c956e
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      c9361731
  5. Mar 12, 2015
  6. Mar 11, 2015
  7. Mar 09, 2015
  8. Mar 07, 2015
  9. Mar 06, 2015
  10. Mar 05, 2015
Loading