Skip to content
Snippets Groups Projects
  1. Mar 01, 2018
  2. Jan 30, 2018
  3. Jan 29, 2018
    • Joel Galenson's avatar
      Add a script to build multiple SELinux targets. · c17c5abe
      Joel Galenson authored
      This script will build the SELinux policy for multiple targets in parallel.
      
      To use it, run:
      ./build_policies.sh <Android root directory> <output directory> [specific targets to build]
      
      If you do not pass any individual targets, it will build all targets it can find.
      
      It will print out the list of failing targets.  You can open up the corresponding log file in the output directory to see the exact errors.
      
      This script is still a work in progress.  It currently cannot discover all build targets (it misses ones "lunch" does not list).
      
      Bug: 33463570
      Test: Ran script to build multiple targets with and without failures.
      Change-Id: Iee8ccf4da38e5eb7ce2034431613fe10c65696ab
      c17c5abe
  4. Jan 10, 2018
    • Jaekyun Seok's avatar
      Whitelist exported platform properties · e4971454
      Jaekyun Seok authored
      This CL lists all the exported platform properties in
      private/exported_property_contexts.
      
      Additionally accessing core_property_type from vendor components is
      restricted.
      Instead public_readable_property_type is used to allow vendor components
      to read exported platform properties, and accessibility from
      vendor_init is also specified explicitly.
      
      Note that whitelisting would be applied only if
      PRODUCT_COMPATIBLE_PROPERTY is set on.
      
      Bug: 38146102
      Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true
      Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
      e4971454
  5. Nov 28, 2017
    • Nicholas Sauer's avatar
      Make sepolicy-analyze for ATS. · b6d6db27
      Nicholas Sauer authored
      bug: 69430536
      Test: make ats-tradefed && ats-tradefed run ats -m
      GtsSecurityHostTestCases
      
      Merged-In: I617a7d08b1bf480f970bc8b4339fa6bbdc347311
      Change-Id: I1d4af47662de5db4e5f7bba244e42930b6de164b
      b6d6db27
    • Nicholas Sauer's avatar
      Make sepolicy-analyze for ATS. · 3257295a
      Nicholas Sauer authored
      bug: 69430536
      Test: make ats-tradefed && ats-tradefed run ats -m
      GtsSecurityHostTestCases
      
      Change-Id: I617a7d08b1bf480f970bc8b4339fa6bbdc347311
      3257295a
  6. Oct 19, 2017
  7. Oct 18, 2017
  8. Oct 16, 2017
  9. Sep 26, 2017
  10. Aug 23, 2017
    • Luis A. Lozano's avatar
      Fix possible memory leak warning. · 635e3ecc
      Luis A. Lozano authored
      Static analyzer complains the memory pointed by list in bcurrent is not
      deallocated before returning. But since this code is in "main" routine,
      we don't care about the deallocation. Just ignore the warning.
      
      Bug: b/27101951
      Test: Verified warning is gone.
      Change-Id: I58d784b61a5ad30d1406bd7c6b28c5713abf2b34
      635e3ecc
  11. Aug 15, 2017
    • Yifan Hong's avatar
      Make sepolicy-analyze for GTS. · 9ffea2f9
      Yifan Hong authored
      Test: gts-tradefed run gts-dev --module=GtsSecurityHostTestCases
      Bug: 64127136
      Change-Id: Ib50294488bb1a5d46faed00d6954db64648fed20
      9ffea2f9
  12. Aug 01, 2017
    • Manoj Gupta's avatar
      Fix static analyzer warnings. · 3cdd4a4b
      Manoj Gupta authored
      Fix the following warnings:
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by '__s1'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by 'id'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'classperms'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'node'
      
      Bug: b/27101951
      Test:Warnings are gone.
      Change-Id: Ib9b2e0b9f19950b4b764d438ee58340e6c022ef5
      3cdd4a4b
  13. Apr 28, 2017
    • Andreas Gampe's avatar
      fc_sort: Fix leaks · c32d7bae
      Andreas Gampe authored
      Use the getline API correctly: keep a single buffer as long as
      possible, and let the callee handle re-allocation. Move the final
      free out of the loop.
      
      Release the head of the linked list.
      
      Bug: 37757586
      Test: ASAN_OPTIONS= SANITIZE_HOST=address mmma system/sepolicy
      Change-Id: I42424acba7cd68c1b9a7a43e916a421ac3e253f7
      c32d7bae
    • Andreas Gampe's avatar
      Sepolicy-Analyze: Plug leak · ee8b67df
      Andreas Gampe authored
      Destroy the policy before exiting (for successful = expected runs).
      
      Bug: 37757759
      Test: ASAN_OPTIONS= SANITIZE_HOST=address m
      Change-Id: I67e35fbede696ec020a53b69a6cef9f374fae167
      ee8b67df
  14. Apr 25, 2017
    • Alex Klyubin's avatar
      Do not warn about empty typesets in neverallows · c60d3ea1
      Alex Klyubin authored
      Empty typeset is not an issue in neverallow rules. The reason is that
      it's completly normal for scontext or tcontext of neverallow rules to
      evaluate to an empty type set. For example, there are neverallow rules
      whose purpose is to test that all types with particular powers are
      associated with a particular attribute:
        neverallow {
          untrusted_app_all
          -untrusted_app
          -untrusted_app_25
        } domain:process fork;
      
      Test: sepolicy-analyze neverallow -w -n \
                'neverallow {} {}:binder call;'
            produces empty output instead of "Warning!  Empty type set"
      Bug: 37357742
      Change-Id: Id61b4fe22fafaf0522d8769dd4e23dfde6cd9f45
      c60d3ea1
  15. Apr 18, 2017
  16. Apr 11, 2017
    • Sandeep Patil's avatar
      sepolicy_version: change current version to NN.m format · 9a3a6a81
      Sandeep Patil authored
      
      The sepolicy version takes SDK_INT.<minor> format. Make sure our
      'current' policy version reflects the format and make it '100000.0'.
      This ensures any vendor.img compiled with this will never work with
      a production framework image either.
      
      Make version_policy replace the '.' in version by '_' so secilc is
      happy too.
      
      This unblocks libvintf from giving out a runtme API to check vendor's
      sepolicy version. The PLAT_PUBLIC_SEPOLICY_CURRENT_VERSION will
      eventually be picked up from the build system.
      
      (cherry-pick of commit 42f95984)
      
      Bug: 35217573
      Test: Build and boot sailfish.
            Boot sailfish with sepolicy compilation on device.
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      
      Change-Id: Ic8b6687c4e71227bf9090018999149cd9e11d63b
      9a3a6a81
  17. Apr 07, 2017
    • Sandeep Patil's avatar
      sepolicy_version: change current version to NN.m format · 42f95984
      Sandeep Patil authored
      
      The sepolicy version takes SDK_INT.<minor> format. Make sure our
      'current' policy version reflects the format and make it '100000.0'.
      This ensures any vendor.img compiled with this will never work with
      a production framework image either.
      
      Make version_policy replace the '.' in version by '_' so secilc is
      happy too.
      
      This unblocks libvintf from giving out a runtme API to check vendor's
      sepolicy version. The PLAT_PUBLIC_SEPOLICY_CURRENT_VERSION will
      eventually be picked up from the build system.
      
      Bug: 35217573
      Test: Build and boot sailfish.
            Boot sailfish with sepolicy compilation on device.
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      
      Change-Id: Ic8b6687c4e71227bf9090018999149cd9e11d63b
      42f95984
    • Martijn Coenen's avatar
      Modify checkfc to check (vnd|hw)service_manager_type. · d48d54a3
      Martijn Coenen authored
      added checkfc options 'l' and 'v' to verify hwservice_manager_type
      and vndservice_manager_type on service context files, respectively.
      
      The checkfc call to verify the new hwservice_contexts files will
      be added together with hwservicemanager ACL CLs later.
      
      Bug: 34454312
      Bug: 36052864
      Test: device boots, works
      Change-Id: Ie3b56da30be47c95a6b05d1bc5e5805acb809783
      d48d54a3
  18. Apr 06, 2017
    • Dan Cashman's avatar
      Add reverse-attribute mapping to sepolicy-analyze. · 3a68bd16
      Dan Cashman authored
      sepolicy-analyze allows users to see all types that have a given
      attribute, but not the reverse case: all attributes of a given type.
      Add a '--reverse' option which enables this, but keeps the previous
      interface.
      
      Usage: sepolicy-analyze sepolicy attribute -r init
      
      Bug: 36508258
      Test: Build and run against current policy.
      
      (cherry picked from commit d444ebed)
      
      Change-Id: I9813ebf61d50fb5abbc8e52be4cf62751979bbd4
      3a68bd16
  19. Mar 31, 2017
    • Dan Cashman's avatar
      Add reverse-attribute mapping to sepolicy-analyze. · d444ebed
      Dan Cashman authored
      sepolicy-analyze allows users to see all types that have a given
      attribute, but not the reverse case: all attributes of a given type.
      Add a '--reverse' option which enables this, but keeps the previous
      interface.
      
      Usage: sepolicy-analyze sepolicy attribute -r init
      
      Bug: 36508258
      Test: Build and run against current policy.
      Change-Id: Ice6893cf7aa2ec4706a7411645a8e0a8a3ad01eb
      d444ebed
  20. Feb 21, 2017
    • Chad Brubaker's avatar
      Add new untrusted_v2_app domain · a782a816
      Chad Brubaker authored
      untrusted_v2_app is basically a refinement of untrusted_app with legacy
      capabilities removed and potentially backwards incompatible changes.
      
      This is not currently hooked up to anything.
      
      Bug: 33350220
      Test: builds
      Change-Id: Ic9fad57476bc2b6022b1eaca8667bf6d844753c2
      a782a816
  21. Feb 14, 2017
    • Michael Peck's avatar
      Add minTargetSdkVersion input selector to seapp_contexts · f54b3622
      Michael Peck authored
      This new input selector allows phasing in new security policies by
      giving app developers an opportunity to make any needed compatibility
      changes before updating each app's targetSdkVersion.
      
      When all else is equal, matching entries with higher
      minTargetSdkVersion= values are preferred over entries with lower
      minTargetSdkVersion= values.
      
      Test: Marlin builds and boots. Apps targeting targetSdkVersion<=25
      run in untrusted_app_25 domain. Apps targeting the current development
      build >=26 run in the untrusted_app domain with fewer permissions. No
      new denials observed during testing.
      Bug: 34115651
      Change-Id: I14bf4f51dbe26cb9bd3f62ad0b281085441d9806
      f54b3622
  22. Dec 12, 2016
  23. Dec 06, 2016
    • dcashman's avatar
      sepolicy: add version_policy tool and version non-platform policy. · 2e00e637
      dcashman authored
      In order to support platform changes without simultaneous updates from
      non-platform components, the platform and non-platform policies must be
      split.  In order to provide a guarantee that policy written for
      non-platform objects continues to provide the same access, all types
      exposed to non-platform policy are versioned by converting them and the
      policy using them into attributes.
      
      This change performs that split, the subsequent versioning and also
      generates a mapping file to glue the different policy components
      together.
      
      Test: Device boots and runs.
      Bug: 31369363
      Change-Id: Ibfd3eb077bd9b8e2ff3b2e6a0ca87e44d78b1317
      2e00e637
  24. Oct 19, 2016
    • William Roberts's avatar
      check_seapp: correct output on invalid policy file · f7d6bb3f
      William Roberts authored
      
      If in invalid policy file is loaded check_seapp outputs:
      
      Error: Could not lod policy file to db: Success!
      
      The "Success" value is from errno, which is not manipulated
      by libsepol. Also, load should have an a in it!
      
      Hardcode the error message to:
      
      Error: Could not load policy file to db: invalid input file!
      
      Test: That when providing an invalid sepolicy binary, that the output
      message is correct.
      Change-Id: Iaf1f85eeb217d484997ee1367d91d461c1195bf4
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      f7d6bb3f
  25. Oct 12, 2016
  26. Oct 07, 2016
  27. Sep 30, 2016
  28. Sep 23, 2016
    • bowgotsai's avatar
      Clean up LOCAL_C_INCLUDES · a6c215bc
      bowgotsai authored
      It should be specified by LOCAL_EXPORT_C_INCLUDE_DIRS from the imported
      libraries.
      
      Change-Id: I5b01ac24763a75984227d77671def6561325b7cc
      a6c215bc
  29. Aug 22, 2016
  30. Aug 19, 2016
    • Janis Danisevskis's avatar
      Port from pcre to pcre2 · a15ea578
      Janis Danisevskis authored
      Ports check_seapp to pcre2.
      
      Merged-In: Ib9977326cfbb19ce143b04504f41afb884f2ec17
      Bug: 24091652
      Change-Id: Ib9977326cfbb19ce143b04504f41afb884f2ec17
      a15ea578
  31. Aug 10, 2016
  32. May 11, 2016
    • Chih-Hung Hsieh's avatar
      Fix misc-macro-parentheses warnings. · 33500c91
      Chih-Hung Hsieh authored
      Add parentheses around macro arguments used beside binary operators.
      Use NOLINT comment to suppress false clang-tidy warnings.
      
      Bug: 28705665
      Change-Id: Idc7474c43da52a1ca6a690b56d8f637767adbb88
      33500c91
  33. Mar 30, 2016
Loading