- Oct 02, 2018
-
-
Howard Ro authored
-
- Oct 01, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
Test: m selinux_policy Change-Id: I6a8ff2200c82b6ecdc1404bc7cf186f439950a30
-
Tri Vo authored
Map proc_qtaguid_ctrl to qtaguid_proc, not qtaguid_device. Map proc_slabinfo to proc in the correct place. Test: m selinux_policy Change-Id: I37c9dfe40bd20924215856b5d4ff7d9b3cbd0417
-
Jeff Vander Stoep authored
Remove these files from proc_net_type. Domains that need access must have permission explicitly granted. Neverallow app access except the shell domain. Bug: 114475727 Test: atest CtsLibcoreOjTestCases Test: netstat, lsof Test: adb bugreport Change-Id: I2304e3e98c0d637af78a361569466aa2fbe79fa0
-
Treehugger Robot authored
-
- Sep 29, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
Private types are not visible to vendor/odm policy, so we don't need mapping entries for them. We build platform-only public policy .cil file and give it as input to treble_sepolicy_tests. Using this public policy the test can now figure out if the newly added type in public or private. Bug: 116344577 Test: adding public type triggers mapping test failure, adding private type does not. Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
-
- Sep 28, 2018
-
-
Sudheer Shanka authored
-
Yifan Hong authored
-
Howard Ro authored
Bug: 116732452 Test: No sepolicy violations observed with this change (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb) Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
-
Sudheer Shanka authored
Bug: 111890351 Test: manual Change-Id: I37d632c9877c6d6f929937d8e25098763807630c
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
This change is for testing potential app-compat issues when removing access to file in /proc/net. See: b/114475727#comment11. Bug: 114475727 Test: build/boot taimen. Test: atest CtsLibcoreOjTestCases Test: FileSystemPermissionTest Test: ListeningPortsTest b/114772424 Change-Id: I1db1c2b41308e47c9ec9db57ea8597a650c8906d (cherry picked from commit 6784f80b)
-
Chenbo Feng authored
In the next Android release, there will be devices that have no xt_qtaguid module at all and framework and netd will decide which code path it takes for trafficStats depending on the device setup. So all apps and services should not depend on this device specific implementation anymore and use public API for the data they need. Bug: 114475331 Bug: 79938294 Test: QtaguidPermissionTest Change-Id: I0d37b2df23782eefa2e8977c6cdbf9210db3e0d2
-
- Sep 27, 2018
-
-
Wei Wang authored
Bug: 116783882 Bug: 111098596 Test: turn on/off system_tracing Change-Id: I089851924bdb1a5cd71598a7014d17fedc87625a
-
Yifan Hong authored
and (un)map on dev mapper. Test: resize partitions during OTA Bug: 110717529 Change-Id: Ia0b66a188232795cf7c649b48af985a583f3471d
-
Nick Kralevich authored
system_file_type is a new attribute used to identify files which exist on the /system partition. It's useful for allow rules in init, which are based off of a blacklist of writable files. Additionally, it's useful for constructing neverallow rules to prevent regressions. Additionally, add commented out tests which enforce that all files on the /system partition have the system_file_type attribute. These tests will be uncommented in a future change after all the device-specific policies are cleaned up. Test: Device boots and no obvious problems. Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
-
Nick Kralevich authored
/system/usr/share/zoneinfo is currently labeled zoneinfo_data_file, a label shared with /data/misc/zoneinfo. However, each of these directory locations has different security characteristics. In particular, the files in /system/usr/share/zoneinfo must never be writable, whereas /data/misc/zoneinfo may be written to by system_server. Reusing the same label hides these different security characteristics. Create a separate label for /system/usr/share/zoneinfo. Test: Device boots and no obvious problems. Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Sep 26, 2018
-
-
Nick Kralevich authored
Otherwise we crash on a null pointer exception. Test: Reference a non-existent type in test code and make sure the test doesn't crash. Change-Id: I5839d2740d51c0df7a8909a3f8430850ae1b2675
-
Nick Kralevich authored
system/sepolicy/public/attributes defines exec_type as: # All types used for domain entry points. attribute exec_type; The linker is not a standalone executable, but rather, used by other executables to resolve shared libraries. It isn't, and must never be, an allowed entrypoint for a domain. Remove the exec_type attribute from system_linker_exec. Test: Device compiles and boots, no obvious problems running the system. Change-Id: I8f2f608bc1a642193524396f46b22933faac5468
-
huangyanjun authored
All the *.conf.dontaudit files are generated from *.conf with the command of 'sed '/dontaudit/d' $@ > $@.dontaudit', but this command can not be applied to multi-line dontaudit statement. Test: Set plat_policy.conf.dontaudit as the input_file parameter of checkpolicy tool, then selinux syntax error will occur during building. Change-Id: I281de923d8a5f0b46256ec7de4df12a1c1d7e061
-
- Sep 25, 2018
-
-
Nick Kralevich authored
Do not attempt to build odm_sepolicy.cil if BOARD_ODM_SEPOLICY_DIRS is not defined. Attempting to do so will create an empty file, which causes build problems when https://github.com/SELinuxProject/selinux/pull/100/commits/0c6ea1e812fbe75aef03ced077d4f4cd26d982fc is applied. Test: "cd system/sepolicy && mma -j55" succeeds Test: "make checkbuild" succeeds Change-Id: Iefc458bddff3d08e5fcb86f8be3cad16d7e36e73
-
- Sep 24, 2018
-
-
Tri Vo authored
Fixes: avc: denied { read } for comm="init" name="linker_asan64" dev="sda22" ino=1833 scontext=u:r:init:s0 tcontext=u:object_r:system_linker_exec:s0 tclass=lnk_file permissive=0 Bug: 116486312 Test: adb unroot && adb shell ls -l /system/bin/linker_asan Change-Id: I754daaf3576e83d516cc9189b8be04dcc41bbc5c
-
Fan Xu authored
Create a new service type buffer_hub_binder_service for BufferHubBinderService and allow bufferhubd to publish the service. Add the service to 26.0, 27.0 and 28.0 compat ignore files since the service is not available in past versions. Fixes: 116022258 Test: build passed Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
-
Treehugger Robot authored
-
Oleksiy Avramchenko authored
Allow vold to run exFAT filesystem check. Test: build, mount exFAT volume Bug: 80202067 Change-Id: I68f3438de89246e806cebe483f37e31c68aaa3d7
-
- Sep 23, 2018
-
-
Jeff Vander Stoep authored
Assert that only apps and installd may open private app files. Remove "open" permission for mediaserver/vold and remove their neverallow exemption. Test: verify no related audit messages in the logs. Test: build Fixes: 80300620 Fixes: 80418809 Bug: 80190017 Change-Id: If0c1862a273af1fedd8898f334c9b0aa6b9be728
-
- Sep 22, 2018
-
-
Kevin Chyn authored
-
Tri Vo authored
-
- Sep 21, 2018
-
-
Nick Kralevich authored
-
Jeffrey Vander Stoep authored
-
Nick Kralevich authored
Avoid generating build time noise so that real errors stand out. https://en.wikipedia.org/wiki/Unix_philosophy Rule of Silence Developers should design programs so that they do not print unnecessary output. This rule aims to allow other programs and developers to pick out the information they need from a program's output without having to parse verbosity. Test: Info messages no longer show up at build time. Bug: 115998215 Change-Id: I33c18e2c7d77ed1bb4132debe13de2ae0907c34c
-
Kevin Chyn authored
Bug: 111461540 Bug: 112570477 Test: builds Change-Id: Icc68720ebe931c2d917703b2d34aa0f4eec3f549 Merged-In: Icc68720ebe931c2d917703b2d34aa0f4eec3f549
-
Tri Vo authored
-
- Sep 20, 2018
-
-
Tri Vo authored
Bug: 115741899 Test: m selinux_policy Change-Id: I5d80a1d9bd5500a82ebf282fb02f0db3a0b0a4c1
-
Tianjie Xu authored
-