- Sep 08, 2017
-
-
Dan Cashman authored
(cherry-pick of commit: 55c77504) Bug: 37916906 Bug: 37896931 Test: none, just prebuilt update. Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
-
Dan Cashman authored
More changes went into oc-dev after the freeze-date. Reflect them. (cherry-pick of commit: 148578a6) Bug: 37916906 Bug: 37896931 Test: prebuilts - none. Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
-
Dan Cashman authored
commit: 5c6a227e added the oc-dev sepolicy prebuilts (api 26.0), but did not include the corresponding base mapping file, which is to be maintained along with current platform development in order to ensure backwards compatibility. (cherry-pick of commit: 5e4e0d7f) Bug: 37916906 Bug: 37896931 Test: none, this just copies the old mapping file to prebuilts. Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
-
Dan Cashman authored
Copy the final system sepolicy from oc-dev to its prebuilt dir corresponding to its version (26.0) so that we can uprev policy and start maintaining compatibility files, as well as use it for CTS tests targeting future platforms. (cherry-pick of commit: 5c6a227e) Bug: 37896931 Bug: 37916906 Test: none, this just copies the old policy. Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
-
- Sep 06, 2017
-
-
Hung-ying Tyan authored
On full Treble devices, servicemanager should only host services served from processes on /system; nonplat_service_contexts should not be created at all in this case. Bug: 36866029 Test: Build marlin and make sure nonplat_service_contexts is not created. Change-Id: Id02c314abbb98fc69884198779488c52231d22c3 Merged-In: Id02c314abbb98fc69884198779488c52231d22c3
-
- Sep 05, 2017
-
-
Steven Moreland authored
This reverts commit 9216a6ad. Bug: 65206688 Merged-In: I8e61b77a1abe9543e4fba77defb8062407676fcf Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
-
- Sep 01, 2017
-
-
Treehugger Robot authored
-
Dan Willemsen authored
Test: SANITIZE_HOST=true m treble_sepolicy_tests Change-Id: I9190dc06715bbbac8a267a143801f99f911decf3
-
Robert Benea authored
-
- Aug 31, 2017
-
-
Lazar Trsic authored
Change-Id: I721a48a441c4a416c1119b17086462f7cb8e5097
-
Treehugger Robot authored
-
- Aug 30, 2017
-
-
Robert Benea authored
Currently lmkd is not able to read memcg info. The mem/swap usage info are used by lmkd to ugrade medium pressure events to critical level. Test: tested on gobo Bug: 65180281 Change-Id: I19d0eb53d5e754c176ffeda1b5d07049e6af8570
-
- Aug 29, 2017
-
-
Ed Coyne authored
Iot would like to allow bootanim to load libraries from /oem but in order for device-specfic sepolicies to grant exec this global restriction needs to be relaxed. Bug: 37992717 Test: Tested with Iot sepolicies in effect and bootanim can exec. Change-Id: I6462bf510562eb3fb06304e50b68fba05d37b285
-
Treehugger Robot authored
-
- Aug 28, 2017
-
-
Jeff Vander Stoep authored
This is needed to retain app's previous access to /sys/devices/system/cpu. When these files were previously labeled in file_contexts, symlinks were labeled as sysfs_devices_system_cpu. When labeling was moved to genfs_contexts symlinks all have the default sysfs label. avc: denied { getattr } for comm="main" path="/sys/devices/system/cpu/cpu0/cpufreq" dev="sysfs" ino=41897 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0 Change-Id: Idaa565390bca13d3819e147fcea4214956c0f589 Bug: 64270911 Test: build aosp_marlin
-
Bowgo Tsai authored
Bug: 63910933 Test: boot sailfish in normal mode, checks adbd is started Test: boot sailfish in recovery mode, checks adbd is started Test: boot bullhead in normal mode, checks adbd is started Test: boot bullhead in recovery mode, checks adbd is started Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79 Merged-In: I35ed78a15a34626fbd3c21d030e2bf51033f7b79 (cherry picked from commit e2423d14)
-
- Aug 25, 2017
-
-
Mark Salyzyn authored
-
Dan Cashman authored
Bug: 36899958 Test: Builds 'n' boots. Change-Id: I5836a18f9d0a9a976dda7304045e3b9e1e84565e Merged-In: I5836a18f9d0a9a976dda7304045e3b9e1e84565e (cherry picked from commit c0713e86)
-
- Aug 24, 2017
-
-
Mark Salyzyn authored
Switch from /data/misc/reboot/last_reboot_reason to persistent Android property persist.sys.boot.reason for indicating why the device is rebooted or shutdown. Introduce protection for all boot reason properties Protect the following properties with these labels ro.boot.bootreason u:object_r:bootloader_boot_reason_prop:s0 sys.boot.reason u:object_r:sys_boot_reason_prop:s0 persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0 Setup the current as-need access rules for each. ToDo: Remove u:object_r:reboot_data_file after internal fixes. Test: system/core/bootstat/boot_reason_test.sh Bug: 64687998 Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
-
- Aug 23, 2017
-
-
Treehugger Robot authored
-
Alex Light authored
If cppreopts.sh failed to copy files for some reason it would leave the temporary files sitting around in the data directory. This changes the selinux rules so that cppreopts is able to get rid of these temporary files. Test: phone boots. Bug: 63995897 Change-Id: I2a7e654c3a3cee7c9f0be8ba64e40c365eee4cfe
-
John Stultz authored
This patch tries to provide similar functionality as the previous change made here: https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/432339/ Only, making sure we add the same map permissions for the vendor directory. Change-Id: Ia965df2881cdee8bb5d81278a1eb740def582871 Signed-off-by:
John Stultz <john.stultz@linaro.org>
-
Jeff Vander Stoep authored
Some selinux build packages are defined in embedded.mk, others are defined in system/sepolicy/Android.mk. Move all to sepolicy as a dependency of the phony package selinux_policy which is defined in embedded.mk. Test: build Marlin (Treble) and Angler (non-Treble) Merged-In: Ib0443ad3da600447fbb51f2e9f91de04dcf5f9f6 Change-Id: Ib0443ad3da600447fbb51f2e9f91de04dcf5f9f6
-
- Aug 17, 2017
-
-
Tianjie Xu authored
am: d90d976e Change-Id: Id7dc23f6b1c401f350736585222a9e29bf5e3876
-
Tianjie Xu authored
-
Martijn Coenen authored
am: 109ee5f9 Change-Id: I47562c12713809970d8531b453f08de74c53466f
-
Martijn Coenen authored
-
- Aug 16, 2017
-
-
Tianjie Xu authored
Denial message: avc: denied { write } for pid=640 comm="update_verifier" name="kmsg" dev="tmpfs" ino=13951 scontext=u:r:update_verifier:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 Bug: 64713327 Test: update_verifier logs successfully during boot time. Change-Id: I421b1e6660239e5ffc624e504f5945d400510407
-
Martijn Coenen authored
This is a Qualcomm proprietary service, and does not belong here. Test: boot Marlin Bug: 63391760 Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820 Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
-
- Aug 14, 2017
-
-
TreeHugger Robot authored
-
Steven Moreland authored
am: 6b780b35 -s ours Change-Id: I61d2951d682b236e7643b7b81eb5c52f84024950
-
Steven Moreland authored
Only seeing this denial in permissive: allow shell screencap_exec:file getattr; Bug: 37565047 Test: adb shell screencap w/o root Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7 Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
-
Steven Moreland authored
Only seeing this denial in permissive: allow shell screencap_exec:file getattr; Bug: 37565047 Test: adb shell screencap w/o root Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7 Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
-
- Aug 11, 2017
-
-
Josh Gao authored
Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log crashes to dmesg when logd isn't up yet (or is the one crashing). Bug: http://b/36574794 Test: stop tombstoned; crasher; dmesg Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
-
Nick Kralevich authored
am: 7a463809 Change-Id: Iba80938afccd21f0c3b69626223b35c672358e77
-
Nick Kralevich authored
Android uses hidepid=2 to restrict visibility to other /proc entries on the system. This helps preserve user, application, and system confidentiality by preventing unauthorized access to application metadata, and addresses attacks such as http://www.cs.ucr.edu/~zhiyunq/pub/sec14_android_activity_inference.pdf Ensure the SELinux (weaker) equivalent is being enforced by adding neverallow compile time assertions. TODO: The "shell" user runs as both an Android application, as well as spawned via adb shell. This was a mistake. We should separate out the "shell" Android app into it's own SELinux domain. For now, exclude the shell from this assertion. (The shell Android app is covered by hidepid=2, so there's no leaking of data, but still, it's over privileged today and should be cleaned up. Bug: 23310674 Test: policy compiles. Compile time assertion only. Change-Id: I0e1a6506b2719aabf7eb8127f046c4ada947ba90
- Aug 02, 2017
-
-
Manoj Gupta authored
am: 4b547a15 Change-Id: Id5b85ec29220cdbc15aab72ddf4dfbd2d4ef2fc7
-
Treehugger Robot authored
-
- Aug 01, 2017
-
-
Manoj Gupta authored
Fix the following warnings: system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning: Potential leak of memory pointed to by '__s1' system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning: Potential leak of memory pointed to by 'id' system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning: Potential leak of memory pointed to by 'classperms' system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning: Potential leak of memory pointed to by 'node' Bug: b/27101951 Test:Warnings are gone. Change-Id: Ib9b2e0b9f19950b4b764d438ee58340e6c022ef5
-