- Feb 09, 2018
-
-
Tom Cherry authored
Bug: 72809699 Test: build Change-Id: Ifb66ad13557af7d2dc6d3ef823e326a5fba51b24
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Feb 08, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 73128755 Test: Built policy. Change-Id: Ie389de04360090594e627e629a59a60092dda6ca
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Restrictions introduced in vendor init mean that new devices may not no longer exempt vendor init from writing to system_data_file. This means we must introduce a new label for /data/vendor which vendor_init may write to. Bug: 73087047 Test: build and boot Taimen and Marlin. Complete SUW, enroll fingerprint No new denials. Change-Id: I65f904bb28952d4776aab947515947e14befbe34
-
- Feb 07, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: Use PLATFORM_SEPOLICY_COMPAT_VERSIONS Move PLATFORM_SEPOLICY_VERSION to make/core/config.mk
-
Treehugger Robot authored
-
Yifan Hong authored
This is a list of sepolicy versions that the framework supports. Test: builds and boots Bug: 67920434 Change-Id: I0f408fa3967214b47a64101760dbbb2542023dcf
-
Yifan Hong authored
Test: m framework_compatibility_matrix.xml -j Test: device boots Bug: 67920434 Bug: 69390067 Change-Id: I3461873c22f704b9bbaa3a4e6f7e1df34d6b61a3
-
Tri Vo authored
Bug: 72878750 Test: build sepolicy Change-Id: Ifa6822e042beed0e5971c85155aa526912807c8a
-
Tri Vo authored
And grant explicit exemption from system_executes_vendor_violators neverallow rules. This does not change the policy, but is needed to test the violator attribute for emptiness. Bug: 72662597 Test: build sepolicy Change-Id: Iba79bb42e1381b221fe0dc53470f62f8267a4791
-
Joel Galenson authored
This should fix presubmit tests. Bug: 73068008 Test: Built policy. Change-Id: Ib27fbad2803eb86ff12526f0ae42eb35917ce59b
-
- Feb 06, 2018
-
-
Tri Vo authored
* changes: Add 27.0 mapping file to system image. Add missing types to 27.0[.ignore].cil. Temporary fix to avoid expandattribute value conflicts. Remove reboot_data_file from 27 mapping file.
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Niklas Brunlid authored
A change in the "open" syscall between kernel 4.4 and 4.9 means that the "create" action is now checked and makes system_server trigger an SELinux denial when PackageSettings is removing a user ID from Settings.java/writeKernelRemoveUserLPr() in PackageManager. Bug: 70150770 Test: Manual - Add a new user on the device, no need to perform setup. - Wait 30s - Remove the added user - While running, check the result of: adb logcat -v time -b events | grep audit | grep system_server Change-Id: I1f490ea95d5bcb2adc76cba041bffbea131b447a
-
Chenbo Feng authored
This reverts commit fad0b04d. Reason for revert: This change crashed facebook App on dogfood build. Bug: 72977484 Change-Id: I4f35b00c11afbd4914f572d3cc0378d740403ed2
-
Tri Vo authored
Bug: 69390067 Test: 27.0.cil is installed to /system/etc/selinux/mapping/27.0.cil Change-Id: If5b37ca7920a66b4fceaa031b6e8e9bafd18ac47
-
Tri Vo authored
Bug: 69390067 Test: build sepolicy Test: 27.0.ignore.cil is a subset 26.0.ignore.cil Change-Id: I6b9a1cfa8b38df4e97e5d63e2938ee9d5a4c83ec
-
Tri Vo authored
Bug: 69390067 Bug: 72757373 Test: build sepolicy Change-Id: I44aeb547ff7ab7042eddfa780df8cbb7dcec71b4
-
Tri Vo authored
reboot_data_file was already removed from 26.cil by aosp/505397 Bug: 69390067 Test: build sepolicy Change-Id: Ieff68cbdaf5b0ddc02d0d3e463765ba3716994ba
-
- Feb 05, 2018
-
-
Chris Morin authored
Since we now call patchoat --verify in zygote art loading code, we have the unintended effect of webview zygote calling patchoat --verify. This is undesireable since webview zygote doesn't need to verify the .art files after the app_process zygote has already done so. The exec of patchoat fails for webview zygote, and this change hides that. This change should be reverted when b/72957399 is resolved. Bug: 66697305 Test: Ensure no new selinux denials were introduced. Change-Id: I4152edc920e5c436516b958b8c861dcc1c4751d8
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: Use a whitelisting strategy for tracefs. Enable Traceur on user builds.
-
Mark Salyzyn authored
llkd needs the ability to forcibly crash the kernel if cause is unlikely to result in an orderly shutdown. It also needs to scan /proc/<pid> for additional process information. Test: lmkd_unit_test --gtest_filter=llkd.* Bug: 33808187 Change-Id: I7f158a13814e79d5ec71fe90dbc7461abb521945
-
Jaekyun Seok authored
The feature of compatible property has its own neverallow rules and it is enforced on devices launchig with Android P. This CL changes hal_nfc to hal_nfc_server in neverallow rules because sepolicy-analyze doesn't recognize it. Additionally one more neverallow rule is added to restrict reading nfc_prop. Bug: 72013705 Bug: 72678352 Test: 'run cts -m CtsSecurityHostTestCases' on walleye with ro.product.first_api_level=28 Change-Id: I753cc81f7ca0e4ad6a2434b2a047052678f57671
-
Carmen Jackson authored
This changes tracefs files to be default-enabled in debug mode, but default-disabled with specific files enabled in user mode. Bug: 64762598 Test: Successfully took traces in user mode. Change-Id: I572ea22253e0c1e42065fbd1d2fd7845de06fceb
-
Treehugger Robot authored
* changes: Using a python script to build sepolicy Renames nonplat_* to vendor_*
-
Andrew Scull authored
-
Andrew Scull authored
Bug: 71527305 Test: compile and boot Change-Id: I91097bd62d99b8dd9eb6f53060badbaf0f4b8b4a (cherry picked from commit 1aedf4b5)
-
Bowgo Tsai authored
Current sepolicy CIL files are built by several command-line tools in Android.mk. This change extracts some of the build logic into a python script to relief the effort in Android.mk. The first command is `build_sepolicy build_cil`. It's possible to add more sub-commands under the build_sepolicy script in the future. Bug: 64240127 Test: build bullhead/taimen Change-Id: Ie0ae4fc5256a550c72954cde5d5dd213a22d159a
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot bullhead/taimen Change-Id: Iea2210c9c8ab30c9ecbcd8146f074e76e90e6943
-
- Feb 03, 2018
-
-
Treehugger Robot authored
* changes: Revert "Renames nonplat_* to vendor_*" Revert "Using a python script to build sepolicy"
-
- Feb 02, 2018
-
-
Jeff Vander Stoep authored
Test: Standard Traceur workflow works successfully with no selinux denials on a user build. Bug: 64762598 Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Tri Vo authored
-