Skip to content
Snippets Groups Projects
  1. Oct 06, 2018
  2. Oct 05, 2018
  3. Oct 04, 2018
  4. Oct 03, 2018
  5. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
    • Howard Ro's avatar
      Merge "Update sepolicies for stats hal" · aabee5fe
      Howard Ro authored
      aabee5fe
  6. Oct 01, 2018
  7. Sep 29, 2018
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      Don't require private types in mapping file. · e3f4f77d
      Tri Vo authored
      Private types are not visible to vendor/odm policy, so we don't need mapping
      entries for them.
      
      We build platform-only public policy .cil file and give it as input to
      treble_sepolicy_tests. Using this public policy the test can now figure out if
      the newly added type in public or private.
      
      Bug: 116344577
      Test: adding public type triggers mapping test failure, adding private type does
      not.
      Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
      e3f4f77d
  8. Sep 28, 2018
  9. Sep 27, 2018
    • Wei Wang's avatar
      Allow traceur to call atrace HAL · da427a33
      Wei Wang authored
      Bug: 116783882
      Bug: 111098596
      Test: turn on/off system_tracing
      Change-Id: I089851924bdb1a5cd71598a7014d17fedc87625a
      da427a33
    • Wei Wang's avatar
      Add atrace HAL 1.0 sepolicy · bc71a610
      Wei Wang authored
      Bug: 111098596
      Test: atrace/systrace
      
      (cherry picked from commit 9ed5cf6e)
      
      Change-Id: I97772ff21754d03a0aea0d53b39e8da5312a17c0
      bc71a610
    • Yifan Hong's avatar
      update_engine: allow to r/w super partition metadata · 37427dbc
      Yifan Hong authored
      and (un)map on dev mapper.
      
      Test: resize partitions during OTA
      Bug: 110717529
      
      Change-Id: Ia0b66a188232795cf7c649b48af985a583f3471d
      37427dbc
    • Nick Kralevich's avatar
      Introduce system_file_type · 5e37271d
      Nick Kralevich authored
      system_file_type is a new attribute used to identify files which exist
      on the /system partition. It's useful for allow rules in init, which are
      based off of a blacklist of writable files. Additionally, it's useful
      for constructing neverallow rules to prevent regressions.
      
      Additionally, add commented out tests which enforce that all files on
      the /system partition have the system_file_type attribute. These tests
      will be uncommented in a future change after all the device-specific
      policies are cleaned up.
      
      Test: Device boots and no obvious problems.
      Change-Id: Id9bae6625f042594c8eba74ca712abb09702c1e5
      5e37271d
    • Nick Kralevich's avatar
      Label /system/usr/share/zoneinfo differently · ff1c765f
      Nick Kralevich authored
      /system/usr/share/zoneinfo is currently labeled zoneinfo_data_file,
      a label shared with /data/misc/zoneinfo. However, each of these
      directory locations has different security characteristics. In
      particular, the files in /system/usr/share/zoneinfo must never be
      writable, whereas /data/misc/zoneinfo may be written to by system_server.
      Reusing the same label hides these different security characteristics.
      
      Create a separate label for /system/usr/share/zoneinfo.
      
      Test: Device boots and no obvious problems.
      Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
      ff1c765f
    • Treehugger Robot's avatar
    • Treehugger Robot's avatar
      91bde1d7
  10. Sep 26, 2018
    • Nick Kralevich's avatar
      gracefully handle hashtab_search failures · bb880a28
      Nick Kralevich authored
      Otherwise we crash on a null pointer exception.
      
      Test: Reference a non-existent type in test code and make sure
          the test doesn't crash.
      
      Change-Id: I5839d2740d51c0df7a8909a3f8430850ae1b2675
      bb880a28
    • Nick Kralevich's avatar
      system_linker_exec: Remove exec_type · dbddbe42
      Nick Kralevich authored
      system/sepolicy/public/attributes defines exec_type as:
      
        # All types used for domain entry points.
        attribute exec_type;
      
      The linker is not a standalone executable, but rather, used by other
      executables to resolve shared libraries. It isn't, and must never be, an
      allowed entrypoint for a domain.
      
      Remove the exec_type attribute from system_linker_exec.
      
      Test: Device compiles and boots, no obvious problems running the system.
      Change-Id: I8f2f608bc1a642193524396f46b22933faac5468
      dbddbe42
    • huangyanjun's avatar
      Fix building error for multi-line dontaudit statement · 25095720
      huangyanjun authored
      All the *.conf.dontaudit files are generated from *.conf
      with the command of 'sed '/dontaudit/d' $@ > $@.dontaudit',
      but this command can not be applied to multi-line dontaudit statement.
      
      Test: Set plat_policy.conf.dontaudit as the input_file parameter of
      checkpolicy tool, then selinux syntax error will occur during building.
      
      Change-Id: I281de923d8a5f0b46256ec7de4df12a1c1d7e061
      25095720
  11. Sep 25, 2018
Loading