Skip to content
Snippets Groups Projects
  1. Jul 03, 2017
  2. Jul 01, 2017
  3. Jun 30, 2017
  4. Jun 26, 2017
    • Stephen Smalley's avatar
      Define smc_socket security class. am: 2be9799b · ad01d1f6
      Stephen Smalley authored
      am: 52909aca
      
      Change-Id: I613dc32aac4b3276924717e8066fd2cd229b81ec
      ad01d1f6
    • Stephen Smalley's avatar
      Merge "Define getrlimit permission for class process" am: e02e0ad1 · 021b5e93
      Stephen Smalley authored
      am: a77096b0
      
      Change-Id: I2719cfbcf0e6ce58c4953602e2113bd6fe1ce0cd
      021b5e93
    • Stephen Smalley's avatar
      Define smc_socket security class. · 52909aca
      Stephen Smalley authored
      am: 2be9799b
      
      Change-Id: If42bc0d3fc50db8294c8a9fd083d915b8e47a95e
      52909aca
    • Stephen Smalley's avatar
      Merge "Define getrlimit permission for class process" · a77096b0
      Stephen Smalley authored
      am: e02e0ad1
      
      Change-Id: I67eea67d667005d5ac357e1131a319ed57b33894
      a77096b0
    • Jeff Vander Stoep's avatar
      Add another extraneous neverallow rule to force attribute inclusion · e3c7880e
      Jeff Vander Stoep authored
      am: c75aa50d
      
      Change-Id: I91bbecf1b60944fb43022dcc5f5ffe452b713193
      e3c7880e
    • Stephen Smalley's avatar
      Define smc_socket security class. · 2be9799b
      Stephen Smalley authored
      
      Linux kernel commit da69a5306ab9 ("selinux: support distinctions among all
      network address families") triggers a build error if a new address family
      is added without defining a corresponding SELinux security class.  As a
      result, the smc_socket class was added to the kernel to resolve a build
      failure as part of merge commit 3051bf36c25d that introduced AF_SMC circa
      Linux 4.11.  Define this security class and its access vector, add
      it to the socket_class_set macro, and exclude it from webview_zygote
      like other socket classes.
      
      Test:  Policy builds
      
      Change-Id: Idbb8139bb09c6d1c47f1a76bd10f4ce1e9d939cb
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      2be9799b
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Add another extraneous neverallow rule to force attribute inclusion · c75aa50d
      Jeff Vander Stoep authored
      Due to the massively increased number of attributes in SELinux policy
      as part of the treble changes, we have had to remove attributes from
      policy for performance reasons.  Unfortunately, some attributes are
      required to be in policy to ensure that our neverallow rules are being
      properly enforced.  Usually this is not a problem, since neverallow rules
      indicate that an attribute should be kept, but this is not currently the
      case when the attribute is part of a negation in a group.
      
      This is particularly problematic with treble since some attributes may
      exist for HALs that have no implementation, and thus no types.  In
      particular, this has caused an issue with the neverallows added in our
      macros.  Add an extraneous neverallow rule to each of those auto-generated
      neverallow rules to make sure that they are not removed from policy, until
      the policy compiler is fixed to avoid this.  Also add corresponding rules
      for other types which have been removed due to no corresponding rules.
      
      Bug: 62658302
      Bug: 62999603
      Test: Build Marlin policy.
      Test: verify attribute exists in policy using sepolicy-analyze.
          sepolicy-analyze $OUT/vendor/etc/selinux/precompiled_sepolicy \
          attribute hal_tetheroffload_server
      Test: CTS neverallow tests pass.
          cts-tradefed run cts -m CtsSecurityHostTestCases -t \
          android.cts.security.SELinuxNeverallowRulesTest
      Change-Id: I62596ba8198ffdcbb4315df639a834e4becaf249
      c75aa50d
  5. Jun 22, 2017
Loading