Skip to content
Snippets Groups Projects
  1. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
    • Howard Ro's avatar
      Merge "Update sepolicies for stats hal" · aabee5fe
      Howard Ro authored
      aabee5fe
  2. Oct 01, 2018
  3. Sep 29, 2018
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      Don't require private types in mapping file. · e3f4f77d
      Tri Vo authored
      Private types are not visible to vendor/odm policy, so we don't need mapping
      entries for them.
      
      We build platform-only public policy .cil file and give it as input to
      treble_sepolicy_tests. Using this public policy the test can now figure out if
      the newly added type in public or private.
      
      Bug: 116344577
      Test: adding public type triggers mapping test failure, adding private type does
      not.
      Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
      e3f4f77d
  4. Sep 28, 2018
  5. Sep 27, 2018
    • Wei Wang's avatar
      Allow traceur to call atrace HAL · da427a33
      Wei Wang authored
      Bug: 116783882
      Bug: 111098596
      Test: turn on/off system_tracing
      Change-Id: I089851924bdb1a5cd71598a7014d17fedc87625a
      da427a33
    • Wei Wang's avatar
      Add atrace HAL 1.0 sepolicy · bc71a610
      Wei Wang authored
      Bug: 111098596
      Test: atrace/systrace
      
      (cherry picked from commit 9ed5cf6e)
      
      Change-Id: I97772ff21754d03a0aea0d53b39e8da5312a17c0
      bc71a610
    • Yifan Hong's avatar
      update_engine: allow to r/w super partition metadata · 37427dbc
      Yifan Hong authored
      and (un)map on dev mapper.
      
      Test: resize partitions during OTA
      Bug: 110717529
      
      Change-Id: Ia0b66a188232795cf7c649b48af985a583f3471d
      37427dbc
    • Nick Kralevich's avatar
      Introduce system_file_type · 5e37271d
      Nick Kralevich authored
      system_file_type is a new attribute used to identify files which exist
      on the /system partition. It's useful for allow rules in init, which are
      based off of a blacklist of writable files. Additionally, it's useful
      for constructing neverallow rules to prevent regressions.
      
      Additionally, add commented out tests which enforce that all files on
      the /system partition have the system_file_type attribute. These tests
      will be uncommented in a future change after all the device-specific
      policies are cleaned up.
      
      Test: Device boots and no obvious problems.
      Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
      5e37271d
    • Nick Kralevich's avatar
      Label /system/usr/share/zoneinfo differently · ff1c765f
      Nick Kralevich authored
      /system/usr/share/zoneinfo is currently labeled zoneinfo_data_file,
      a label shared with /data/misc/zoneinfo. However, each of these
      directory locations has different security characteristics. In
      particular, the files in /system/usr/share/zoneinfo must never be
      writable, whereas /data/misc/zoneinfo may be written to by system_server.
      Reusing the same label hides these different security characteristics.
      
      Create a separate label for /system/usr/share/zoneinfo.
      
      Test: Device boots and no obvious problems.
      Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
      ff1c765f
    • Treehugger Robot's avatar
    • Treehugger Robot's avatar
      91bde1d7
  6. Sep 26, 2018
    • Nick Kralevich's avatar
      gracefully handle hashtab_search failures · bb880a28
      Nick Kralevich authored
      Otherwise we crash on a null pointer exception.
      
      Test: Reference a non-existent type in test code and make sure
          the test doesn't crash.
      
      Change-Id: I5839d2740d51c0df7a8909a3f8430850ae1b2675
      bb880a28
    • Nick Kralevich's avatar
      system_linker_exec: Remove exec_type · dbddbe42
      Nick Kralevich authored
      system/sepolicy/public/attributes defines exec_type as:
      
        # All types used for domain entry points.
        attribute exec_type;
      
      The linker is not a standalone executable, but rather, used by other
      executables to resolve shared libraries. It isn't, and must never be, an
      allowed entrypoint for a domain.
      
      Remove the exec_type attribute from system_linker_exec.
      
      Test: Device compiles and boots, no obvious problems running the system.
      Change-Id: I8f2f608bc1a642193524396f46b22933faac5468
      dbddbe42
    • huangyanjun's avatar
      Fix building error for multi-line dontaudit statement · 25095720
      huangyanjun authored
      All the *.conf.dontaudit files are generated from *.conf
      with the command of 'sed '/dontaudit/d' $@ > $@.dontaudit',
      but this command can not be applied to multi-line dontaudit statement.
      
      Test: Set plat_policy.conf.dontaudit as the input_file parameter of
      checkpolicy tool, then selinux syntax error will occur during building.
      
      Change-Id: I281de923d8a5f0b46256ec7de4df12a1c1d7e061
      25095720
  7. Sep 25, 2018
  8. Sep 24, 2018
    • Tri Vo's avatar
      Label /system/bin/linker* symlinks as system_file. · 6cd9bd07
      Tri Vo authored
      Fixes:
      avc: denied { read } for comm="init" name="linker_asan64" dev="sda22" ino=1833
      scontext=u:r:init:s0 tcontext=u:object_r:system_linker_exec:s0 tclass=lnk_file
      permissive=0
      
      Bug: 116486312
      Test: adb unroot && adb shell ls -l /system/bin/linker_asan
      Change-Id: I754daaf3576e83d516cc9189b8be04dcc41bbc5c
      6cd9bd07
    • Fan Xu's avatar
      Update SELinux Policy for bufferhubd · 26fa914c
      Fan Xu authored
      Create a new service type buffer_hub_binder_service for
      BufferHubBinderService and allow bufferhubd to publish the service.
      
      Add the service to 26.0, 27.0 and 28.0 compat ignore files since the
      service is not available in past versions.
      
      Fixes: 116022258
      Test: build passed
      
      Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
      26fa914c
    • Treehugger Robot's avatar
      06ddf4b4
    • Oleksiy Avramchenko's avatar
      Add label for /system/bin/fsck.exfat · 65a0b507
      Oleksiy Avramchenko authored
      Allow vold to run exFAT filesystem check.
      
      Test: build, mount exFAT volume
      Bug: 80202067
      Change-Id: I68f3438de89246e806cebe483f37e31c68aaa3d7
      65a0b507
  9. Sep 23, 2018
    • Jeff Vander Stoep's avatar
      Further lock down app data · 0b67bb88
      Jeff Vander Stoep authored
      Assert that only apps and installd may open private app files.
      
      Remove "open" permission for mediaserver/vold and remove their
      neverallow exemption.
      
      Test: verify no related audit messages in the logs.
      Test: build
      Fixes: 80300620
      Fixes: 80418809
      Bug: 80190017
      Change-Id: If0c1862a273af1fedd8898f334c9b0aa6b9be728
      0b67bb88
  10. Sep 22, 2018
  11. Sep 21, 2018
  12. Sep 20, 2018
Loading