- Feb 07, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 73068008 Test: Built policy. Change-Id: Ib27fbad2803eb86ff12526f0ae42eb35917ce59b
-
- Feb 06, 2018
-
-
Tri Vo authored
* changes: Add 27.0 mapping file to system image. Add missing types to 27.0[.ignore].cil. Temporary fix to avoid expandattribute value conflicts. Remove reboot_data_file from 27 mapping file.
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Niklas Brunlid authored
A change in the "open" syscall between kernel 4.4 and 4.9 means that the "create" action is now checked and makes system_server trigger an SELinux denial when PackageSettings is removing a user ID from Settings.java/writeKernelRemoveUserLPr() in PackageManager. Bug: 70150770 Test: Manual - Add a new user on the device, no need to perform setup. - Wait 30s - Remove the added user - While running, check the result of: adb logcat -v time -b events | grep audit | grep system_server Change-Id: I1f490ea95d5bcb2adc76cba041bffbea131b447a
-
Chenbo Feng authored
This reverts commit fad0b04d. Reason for revert: This change crashed facebook App on dogfood build. Bug: 72977484 Change-Id: I4f35b00c11afbd4914f572d3cc0378d740403ed2
-
Tri Vo authored
Bug: 69390067 Test: 27.0.cil is installed to /system/etc/selinux/mapping/27.0.cil Change-Id: If5b37ca7920a66b4fceaa031b6e8e9bafd18ac47
-
Tri Vo authored
Bug: 69390067 Test: build sepolicy Test: 27.0.ignore.cil is a subset 26.0.ignore.cil Change-Id: I6b9a1cfa8b38df4e97e5d63e2938ee9d5a4c83ec
-
Tri Vo authored
Bug: 69390067 Bug: 72757373 Test: build sepolicy Change-Id: I44aeb547ff7ab7042eddfa780df8cbb7dcec71b4
-
Tri Vo authored
reboot_data_file was already removed from 26.cil by aosp/505397 Bug: 69390067 Test: build sepolicy Change-Id: Ieff68cbdaf5b0ddc02d0d3e463765ba3716994ba
-
- Feb 05, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: Use a whitelisting strategy for tracefs. Enable Traceur on user builds.
-
Mark Salyzyn authored
llkd needs the ability to forcibly crash the kernel if cause is unlikely to result in an orderly shutdown. It also needs to scan /proc/<pid> for additional process information. Test: lmkd_unit_test --gtest_filter=llkd.* Bug: 33808187 Change-Id: I7f158a13814e79d5ec71fe90dbc7461abb521945
-
Jaekyun Seok authored
The feature of compatible property has its own neverallow rules and it is enforced on devices launchig with Android P. This CL changes hal_nfc to hal_nfc_server in neverallow rules because sepolicy-analyze doesn't recognize it. Additionally one more neverallow rule is added to restrict reading nfc_prop. Bug: 72013705 Bug: 72678352 Test: 'run cts -m CtsSecurityHostTestCases' on walleye with ro.product.first_api_level=28 Change-Id: I753cc81f7ca0e4ad6a2434b2a047052678f57671
-
Carmen Jackson authored
This changes tracefs files to be default-enabled in debug mode, but default-disabled with specific files enabled in user mode. Bug: 64762598 Test: Successfully took traces in user mode. Change-Id: I572ea22253e0c1e42065fbd1d2fd7845de06fceb
-
Treehugger Robot authored
* changes: Using a python script to build sepolicy Renames nonplat_* to vendor_*
-
Andrew Scull authored
-
Andrew Scull authored
Bug: 71527305 Test: compile and boot Change-Id: I91097bd62d99b8dd9eb6f53060badbaf0f4b8b4a (cherry picked from commit 1aedf4b5)
-
Bowgo Tsai authored
Current sepolicy CIL files are built by several command-line tools in Android.mk. This change extracts some of the build logic into a python script to relief the effort in Android.mk. The first command is `build_sepolicy build_cil`. It's possible to add more sub-commands under the build_sepolicy script in the future. Bug: 64240127 Test: build bullhead/taimen Change-Id: Ie0ae4fc5256a550c72954cde5d5dd213a22d159a
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot bullhead/taimen Change-Id: Iea2210c9c8ab30c9ecbcd8146f074e76e90e6943
-
- Feb 03, 2018
-
-
Treehugger Robot authored
* changes: Revert "Renames nonplat_* to vendor_*" Revert "Using a python script to build sepolicy"
-
- Feb 02, 2018
-
-
Jeff Vander Stoep authored
Test: Standard Traceur workflow works successfully with no selinux denials on a user build. Bug: 64762598 Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Tri Vo authored
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72749888 Test: Built policy. Change-Id: Ie55127f1b570832c03878d1c697262239ac14003
-
Jeff Vander Stoep authored
aosp/605217 adds the following lines: genfscon tracefs /options/print-tgid u:object_r:debugfs_tracing:s0 genfscon debugfs /tracing/options/print-tgid u:object_r:debugfs_tracing:s0 However, the m4 pre-processing step of selinux policy compilation outputs: genfscon tracefs /options/-tgid u:object_r:debugfs_tracing:s0 genfscon debugfs /tracing/options/-tgid u:object_r:debugfs_tracing:s0 And as a result of the "print" it prints: m4: system/sepolicy/private/genfs_contexts: 177: m4: system/sepolicy/private/genfs_contexts: 203: Due to the following macro: https://android.googlesource.com/platform/system/sepolicy/+/oreo-mr1-dev/public/te_macros#580 This change removes the now-deprecated print macro to unblock aosp/605217. Bug: 72862003 Test: verify that the m4 output for aosp/605217 is correct. Change-Id: Ia4ec96e16b98e8df241cceb64e3f3b7bea9a7f3d
-
Treehugger Robot authored
-
Bowgo Tsai authored
This reverts commit 9aa8496f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build Change-Id: I77671a74cd952544a1dbb3daabc2bb449a7c2cf2
-
Bowgo Tsai authored
This reverts commit 3506ad3f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build
-
- Feb 01, 2018
-
-
Paul Crowley authored
Bug: 63927601 Test: Enable metadata encryption in fstab on Taimen, check boot success. Change-Id: Iddbcd05501d360d2adc4edf8ea7ed89816642d26
-
Treehugger Robot authored
-
Treehugger Robot authored
Merge "Add this rule allows incidentd CTS tests be able to use incident command to fetch data from shell."
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72811052 Test: Built policy. Change-Id: Ifcfe71c717a3b1e59cd1810c7f9be588d48c99a5
-
Bowgo Tsai authored
Need use 'nonplat_service_contexts_file' as the file context for /vendor_service_context on non full-treble device. Otherwise, servicemanager can't read the file. Bug: 72787689 Test: build Change-Id: Ib54e4f2501c7bbf8b397eacf4afadfae344ddd03
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Tri Vo authored
This file is /vendor/etc/selinux/nonplat_sepolicy.cil from aosp_arm64-eng from mr1-dev Bug: 69390067 Test: prebuilt only change Change-Id: I717513ae66e806afe0071cf5b42e9f709264d0b6
-
- Jan 31, 2018
-
-
Yin-Chia Yeh authored
-