- Nov 29, 2017
-
-
Nicholas Sauer authored
am: 4ebbe461 -s ours Change-Id: I72f7b323551fc2151668203db725710231c836c5
-
Nicholas Sauer authored
-
- Nov 28, 2017
-
-
Calin Juravle authored
am: 15da30b6 Change-Id: I6a06b84d6319680d73d38ec16ca6e142d79290d1
-
Nicholas Sauer authored
bug: 69430536 Test: make ats-tradefed && ats-tradefed run ats -m GtsSecurityHostTestCases Merged-In: I617a7d08b1bf480f970bc8b4339fa6bbdc347311 Change-Id: I1d4af47662de5db4e5f7bba244e42930b6de164b
-
Calin Juravle authored
Allow system_server to open profile snapshots for read. System server never reads the actual content. It passes the descriptor to to privileged apps which acquire the permissions to inspect the profiles. Test: installd_dexopt_test Bug: 30934496 Change-Id: I1d1f07a05261af25f6640040af1500c9a4d5b8d5
-
Tri Vo authored
And give shell domain read access to /proc/sys/kernel/pic_max. Bug: 69569397 Test: adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests --gtest_filter=pthread.pthread_mutex_owner_tid_limit Change-Id: Ib56c18ed553ad2c2113e6913788a4c00965483cc
-
- Nov 27, 2017
-
-
Nick Kralevich authored
am: b8b4f5d6 Change-Id: I68d5ca0bf61c25e54f8d6a6aa77a326c3c0d67bf
-
Nick Kralevich authored
Remove a number of SELinux rules which were required to support file based OTA. After this, we can have a much stronger assertion that files on /system are immutable. Tighten up the neverallow rules at the same time. Bug: 35853185 Bug: 15575013 Bug: 69664758 Test: adb reboot recovery && adb sideload [file] Change-Id: I22aa208859b8478a2a90e1ed1c0f0d6b62a6664e
-
- Nov 22, 2017
-
-
Nick Kralevich authored
am: df642bef Change-Id: I63f0f9b8cfb6e7161b8b89bda377a43d1e114e21
-
Nick Kralevich authored
9b2e0cbe changed all uses of capability to global_capability_class_set but accidentally omitted one entry. Fix the one entry. Test: policy compiles. Change-Id: I1bb8c494a2660d9f02783c93b07d4238a2575106
-
Nick Kralevich authored
am: b6a05a93 Change-Id: I827b6604f6eed56749e71c6e3451d8693f274bdc
-
Nick Kralevich authored
Self sideload OTA installation is aborted in #PPR1.171122.001. Likely cause is the removal of the file-based OTA rules. Revert the change while I investigate. This reverts commit 73885755. Bug: 35853185 Bug: 69664758 Bug: 15575013 Change-Id: I65ca3bad7251f06df33eae8b2d4bcfada93ae9b8
-
Jiyong Park authored
am: 5086506a Change-Id: Icf4ba89621620ac7c624dc1d680bf61f807e163e
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: 6a28b68d Change-Id: I774787b48c0b5f6f20313ee6f9c8062db4072e84
-
Jeff Vander Stoep authored
Commit 7688161c "hal_*_(client|server) => hal(client|server)domain" added neverallow rules on hal_*_client attributes while simultaneously expanding these attribute which causes them to fail CTS neverallow tests. Remove these neverallow rules as they do not impose specific security properties that we want to enforce. Modify Other neverallow failures which were imposed on hal_foo attributes and should have been enforced on hal_foo_server attributes instead. Bug: 69566734 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed remaining failure appears to be caused by b/68133473 Test: build taimen-user/userdebug Change-Id: I619e71529e078235ed30dc06c60e6e448310fdbc
-
Jiyong Park authored
In P, we will be supporting privileged apps in vendor partition, thus need to label /vendor/priv-app as vendor_app_file so that apps can exist under the dir. Bug: 35301609 Test: N/A since there is no /vendor/priv-app yet. Framework change which is currently in the internal is required. Change-Id: I86a765ef9da5267113e64a7cbb38ba0abf5c2835
-
Nick Kralevich authored
am: 4fbbd147 Change-Id: I304c54a480b150a8c910f268ccf84869dfb7e3f5
-
Treehugger Robot authored
-
- Nov 21, 2017
-
-
Courtney Goeltzenleuchter authored
am: 0629dedc Change-Id: I576b7b98ba147c97a992ea3c65239060c4cec51e
-
Courtney Goeltzenleuchter authored
-
Nick Kralevich authored
Remove a number of SELinux rules which were required to support file based OTA. After this, we can have a much stronger assertion that files on /system are immutable. Tighten up the neverallow rules at the same time. Bug: 35853185 Bug: 15575013 Test: adb reboot recovery && adb sideload [file] Change-Id: I4238d17808bed6a81f47e14eb1797496c07642e2
-
Jeffrey Vander Stoep authored
am: 18cb4dae Change-Id: Ibbaef489e45195aa105b6df09bb7378481ab2d06
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
am: cd69bebf Change-Id: I6f3c20144c971d5040ee325e8bc0e9cff70085a0
-
Jeffrey Vander Stoep authored
This reverts commit ed876a5e. Fixes user builds. libsepol.report_failure: neverallow on line 513 of system/sepolicy/public/domain.te (or line 9149 of policy.conf) violated by allow update_verifier misc_block_device:blk_file { ioctl read write lock append open }; libsepol.check_assertions: 1 neverallow failures occurred Error while expanding policy Bug: 69566734 Test: build taimen-user Change-Id: I969b7539dce547f020918ddc3e17208fc98385c4
-
Jeff Vander Stoep authored
am: ed876a5e Change-Id: Ic41e1b997968acfd68ade6e9b9901a4dd9b8d2d2
-
Jeff Vander Stoep authored
Commit 7688161c "hal_*_(client|server) => hal(client|server)domain" added neverallow rules on hal_*_client attributes while simultaneously expanding these attribute which causes them to fail CTS neverallow tests. Remove these neverallow rules as they do not impose specific security properties that we want to enforce. Modify Other neverallow failures which were imposed on hal_foo attributes and should have been enforced on hal_foo_server attributes instead. Bug: 69566734 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed remaining failure appears to be caused by b/68133473 Change-Id: I83dcb33c3a057f126428f88a90b95f3f129d9f0e
-
Benjamin Gordon authored
am: b9ea282c Change-Id: I77676d7adb39747b9195489ef83d72e57cdb3b59
-
Benjamin Gordon authored
-
Courtney Goeltzenleuchter authored
Test: build Bug: 63710530 Change-Id: I85cddfaf3ec004165040935f8723e9eed0ef7900
-
Jeff Vander Stoep authored
am: 11c5700f Change-Id: I10a19ad706d053e1a7a8e9f5d07d7c30aad0a053
-
Treehugger Robot authored
-
Benjamin Gordon authored
In kernel 4.7, the capability and capability2 classes were split apart from cap_userns and cap2_userns (see kernel commit 8e4ff6f228e4722cac74db716e308d1da33d744f). Since then, Android cannot be run in a container with SELinux in enforcing mode. This change applies the existing capability rules to user namespaces as well as the root namespace so that Android running in a container behaves the same on pre- and post-4.7 kernels. This is essentially: 1. New global_capability_class_set and global_capability2_class_set that match capability+cap_userns and capability2+cap2_userns, respectively. 2. s/self:capability/self:global_capability_class_set/g 3. s/self:capability2/self:global_capability2_class_set/g 4. Add cap_userns and cap2_userns to the existing capability_class_set so that it covers all capabilities. This set was used by several neverallow and dontaudit rules, and I confirmed that the new classes are still appropriate. Test: diff new policy against old and confirm that all new rules add only cap_userns or cap2_userns; Boot ARC++ on a device with the 4.12 kernel. Bug: crbug.com/754831 Change-Id: I4007eb3a2ecd01b062c4c78d9afee71c530df95f
-
Jeff Vander Stoep authored
Bug: 69175449 Bug: 69197466 Test: build Change-Id: I11e46b65449cb6f451ecab8d4dff9adc162fe115
-
Vishnu Nair authored
am: df8d4b87 Change-Id: Ia617cd27b03de715772eb2d94205422ad8dfe745
-
- Nov 20, 2017
-
-
Vishnu Nair authored
Bug: 64831661 Test: adb shell cmd window tracing start && adb shell cmd window tracing stop Test: adb shell su root dmesg | grep 'avc: ' Change-Id: I1578aac9e102246ec722c78a6e9efb5581259d81
-
Jeff Vander Stoep authored
Unconditionally compile treble_sepolicy_tests. Make compat files conditional on running the compat tests. Bug: 37008075 Test: build Change-Id: Ib3aee6e93d285ca141803a13958fbcb38b891b68
-
Nick Kralevich authored
am: 9d9c370f Change-Id: I9499a44812b32f7f2cde3d069722d442d21ad6da
-