- Oct 06, 2018
-
-
Joel Galenson authored
Test: Run script and find unescaped periods. Change-Id: I35a4366aa576d5c6036d0dcfb068ca4e0f27fff9
-
- Oct 05, 2018
-
-
Joel Galenson authored
This fixes a build breakage. Test: Build policy. Change-Id: Id5209a2bd6446ac6dd744b7426f540bc1a8641ed
-
Christine Franks authored
-
Daniel Rosenberg authored
-
- Oct 04, 2018
-
-
Christine Franks authored
Bug: 111215474 Test: boots Change-Id: Ib8cabeb64a8b4ec9f592d870bd0af611a2720cc7
-
Treehugger Robot authored
-
Nick Kralevich authored
system_file_type is an attribute assigned to all files on the /system partition. Add a compile time test to ensure that the attribute is assigned to all the relevant types. Test: code compiles. Change-Id: I7d69a04a4f04f6269cc408f25527b948756cc079
-
Tri Vo authored
python3 is not required on host machines. Bug: 117260689 Test: m selinux_policy Change-Id: Iea31eadcb3f09ffadca82dd1862cf5538259c710
-
Martijn Coenen authored
apexd is a new daemon for managing APEX packages installed on the device. It hosts a single binder service, "apexservice". Bug: 112455435 Test: builds, binder service can be registered, apexes can be accessed, verified and mounted Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
-
Tri Vo authored
-
- Oct 03, 2018
-
-
Daniel Rosenberg authored
Allows checkpoint commands to check A/B update status Test: vdc checkpoint startCheckpoint -1 Bug: 111020314 Change-Id: I086db548d55176bf88211001c7c1eecb8c50689e
-
Nick Kralevich authored
Isolated apps provide a very strict security guarantee, including the inability to create networking sockets like TCP / UDP sockets. Add an SELinux neverallow assertion to test for this and prevent regressions. Test: policy compiles. Change-Id: I2618abb17375707eb1048e89faa46f57d33e1df4
-
Treehugger Robot authored
-
- Oct 02, 2018
-
-
Tri Vo authored
New maintenance scheme for mapping files: Say, V is the current SELinux platform version, then at any point in time we only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1) and bottom (V-n+1->V-n) without changes to previously maintained mapping files. Caveats: - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather current->26.0. We'll fully migrate to the scheme with future releases. Bug: 67510052 Test: adding new public type only requires changing the latest compat map Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
-
Howard Ro authored
-
- Oct 01, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
Test: m selinux_policy Change-Id: I6a8ff2200c82b6ecdc1404bc7cf186f439950a30
-
Tri Vo authored
Map proc_qtaguid_ctrl to qtaguid_proc, not qtaguid_device. Map proc_slabinfo to proc in the correct place. Test: m selinux_policy Change-Id: I37c9dfe40bd20924215856b5d4ff7d9b3cbd0417
-
Jeff Vander Stoep authored
Remove these files from proc_net_type. Domains that need access must have permission explicitly granted. Neverallow app access except the shell domain. Bug: 114475727 Test: atest CtsLibcoreOjTestCases Test: netstat, lsof Test: adb bugreport Change-Id: I2304e3e98c0d637af78a361569466aa2fbe79fa0
-
Treehugger Robot authored
-
- Sep 29, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
Private types are not visible to vendor/odm policy, so we don't need mapping entries for them. We build platform-only public policy .cil file and give it as input to treble_sepolicy_tests. Using this public policy the test can now figure out if the newly added type in public or private. Bug: 116344577 Test: adding public type triggers mapping test failure, adding private type does not. Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
-
- Sep 28, 2018
-
-
Sudheer Shanka authored
-
Yifan Hong authored
-
Howard Ro authored
Bug: 116732452 Test: No sepolicy violations observed with this change (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb) Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
-
Sudheer Shanka authored
Bug: 111890351 Test: manual Change-Id: I37d632c9877c6d6f929937d8e25098763807630c
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
This change is for testing potential app-compat issues when removing access to file in /proc/net. See: b/114475727#comment11. Bug: 114475727 Test: build/boot taimen. Test: atest CtsLibcoreOjTestCases Test: FileSystemPermissionTest Test: ListeningPortsTest b/114772424 Change-Id: I1db1c2b41308e47c9ec9db57ea8597a650c8906d (cherry picked from commit 6784f80b)
-
Chenbo Feng authored
In the next Android release, there will be devices that have no xt_qtaguid module at all and framework and netd will decide which code path it takes for trafficStats depending on the device setup. So all apps and services should not depend on this device specific implementation anymore and use public API for the data they need. Bug: 114475331 Bug: 79938294 Test: QtaguidPermissionTest Change-Id: I0d37b2df23782eefa2e8977c6cdbf9210db3e0d2
-
- Sep 27, 2018
-
-
Wei Wang authored
Bug: 116783882 Bug: 111098596 Test: turn on/off system_tracing Change-Id: I089851924bdb1a5cd71598a7014d17fedc87625a
-
Yifan Hong authored
and (un)map on dev mapper. Test: resize partitions during OTA Bug: 110717529 Change-Id: Ia0b66a188232795cf7c649b48af985a583f3471d
-
Nick Kralevich authored
system_file_type is a new attribute used to identify files which exist on the /system partition. It's useful for allow rules in init, which are based off of a blacklist of writable files. Additionally, it's useful for constructing neverallow rules to prevent regressions. Additionally, add commented out tests which enforce that all files on the /system partition have the system_file_type attribute. These tests will be uncommented in a future change after all the device-specific policies are cleaned up. Test: Device boots and no obvious problems. Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
-
Nick Kralevich authored
/system/usr/share/zoneinfo is currently labeled zoneinfo_data_file, a label shared with /data/misc/zoneinfo. However, each of these directory locations has different security characteristics. In particular, the files in /system/usr/share/zoneinfo must never be writable, whereas /data/misc/zoneinfo may be written to by system_server. Reusing the same label hides these different security characteristics. Create a separate label for /system/usr/share/zoneinfo. Test: Device boots and no obvious problems. Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Sep 26, 2018
-
-
Nick Kralevich authored
Otherwise we crash on a null pointer exception. Test: Reference a non-existent type in test code and make sure the test doesn't crash. Change-Id: I5839d2740d51c0df7a8909a3f8430850ae1b2675
-
Nick Kralevich authored
system/sepolicy/public/attributes defines exec_type as: # All types used for domain entry points. attribute exec_type; The linker is not a standalone executable, but rather, used by other executables to resolve shared libraries. It isn't, and must never be, an allowed entrypoint for a domain. Remove the exec_type attribute from system_linker_exec. Test: Device compiles and boots, no obvious problems running the system. Change-Id: I8f2f608bc1a642193524396f46b22933faac5468
-
huangyanjun authored
All the *.conf.dontaudit files are generated from *.conf with the command of 'sed '/dontaudit/d' $@ > $@.dontaudit', but this command can not be applied to multi-line dontaudit statement. Test: Set plat_policy.conf.dontaudit as the input_file parameter of checkpolicy tool, then selinux syntax error will occur during building. Change-Id: I281de923d8a5f0b46256ec7de4df12a1c1d7e061
-
- Sep 25, 2018
-
-
Nick Kralevich authored
Do not attempt to build odm_sepolicy.cil if BOARD_ODM_SEPOLICY_DIRS is not defined. Attempting to do so will create an empty file, which causes build problems when https://github.com/SELinuxProject/selinux/pull/100/commits/0c6ea1e812fbe75aef03ced077d4f4cd26d982fc is applied. Test: "cd system/sepolicy && mma -j55" succeeds Test: "make checkbuild" succeeds Change-Id: Iefc458bddff3d08e5fcb86f8be3cad16d7e36e73
-