Skip to content
Snippets Groups Projects
  1. Apr 24, 2018
    • Jeff Vander Stoep's avatar
      searchpolicy depends on FcSort · cc541a80
      Jeff Vander Stoep authored
      Bug: 77965486
      Test: run cts -m CtsSecurityHostTestCases -t
          android.cts.security.FileSystemPermissionTest#testDevHwRandomPermissions
      
      Change-Id: Ib5965649e9b2b4bb0259383374dfac76cc0a8bd5
      cc541a80
  2. Feb 13, 2018
    • Jeff Vander Stoep's avatar
      Improve data separation test coverage · 55d5e284
      Jeff Vander Stoep authored
      To areas need better coverage:
      1. Tests are not verifying that files in /data/vendor do not have the
      core_data_file_type attribute.
      2. No error is thrown if a type lives in both /data/vendor
      /data/<not vendor>.
      
      Bug: 72998741
      Test: build all selinux policies on master (assert build time tests)
      Test: build and boot Marlin and Taimen, verify no selinux denials and
          everything works as expected.
      
      Change-Id: I133a068123139a599b9b81ddcc254616894621eb
      55d5e284
  3. Oct 04, 2017
  4. Sep 28, 2017
  5. Sep 26, 2017
  6. Sep 25, 2017
  7. Sep 24, 2017
  8. Sep 23, 2017
  9. Sep 01, 2017
  10. Aug 24, 2017
    • Jeff Vander Stoep's avatar
      add searchpolicy.py for automated tests · dec443e7
      Jeff Vander Stoep authored
      searchpolicy.py provides a subset of the functionality of sesearch.
      
      The primary benefit being that it's entirely built in-tree and thus
      can be packaged for use in automated tests included compatibility
      test suites.
      
      Example
      searchpolicy.py --libpath out/host/linux-x86/lib64/ --allow --source domain
      
      Bug: 63397379
      Test: Identical output with sesearch for the following commands
          --allow --source domain
          --allow --target domain
          --allow --target appdomain -p ioctl,open
          --allow --source lmkd -c file -p ioctl,open
          --allow --source lmkd -c file,dir -p ioctl,open
      Change-Id: I89a6c333f1f519d9171fbc1aafe27eaf5ad247f0
      dec443e7
  11. Aug 08, 2017
    • Dan Cashman's avatar
      Add 26.0 api compatibility check infrastructure. · 7f7c3b82
      Dan Cashman authored
      Add support to the treble_sepolicy_tests suite that explicitly look at
      the old and current policy versions, as well as the compatibility file,
      to determine if any new types have been added without a compatibility
      entry.  This first test catches the most common and likely changes that
      could change the type label of an object for which vendor policy may have
      needed access.  It also should prove the basis for additional compatibility
      checks between old and new policies.
      
      Bug: 36899958
      Test: Policy builds and tests pass.
      Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
      7f7c3b82
  12. Jun 13, 2017
  13. Jun 05, 2017
    • Jeff Vander Stoep's avatar
      Run Treble sepolicy tests at build time · 1fc0682e
      Jeff Vander Stoep authored
      Bug: 37008075
      Test: build policy on Marlin
      Change-Id: I53748f94c5df66fa17a53e7d0bed1be6b8603544
      (cherry picked from commit e1ddc6df)
      1fc0682e
    • Jeff Vander Stoep's avatar
      Verify correct application of labels and attributes · bdfc0301
      Jeff Vander Stoep authored
      With project Treble, we're relying heavily on attributes for
      permission inheritance and enforcement of separation between
      platform and vendor components.
      
      We neead tests that verify those attributes are correctly applied.
      This change adds the framework for those tests including a wrapper
      around libsepol for loading and querying policy, and a python module
      for running tests on policy and file_contexts.
      
      Included with the testing framework is a test asserting that the
      coredomain attribute is only applied to core processes. This
      verification is done using the following rules:
      1. Domain's entrypoint is on /system - coredomain
      2. Domain's entrypoint is on /vendor - not coredomain
      3. Domain belongs to a whitelist of known coredomains - coredomain
      
      In a subsequent commit these tests will be applied at build time.
      However, I first need to fix existing Treble violations exposed by
      this test. These tests will also be applied during CTS.
      
      Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \
          treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \
          -f $OUT/vendor/etc/selinux/nonplat_file_contexts \
          -f $OUT/system/etc/selinux/plat_file_contexts
      Bug: 37008075
      Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9
      (cherry picked from commit 0366afdf)
      bdfc0301
  14. Jun 02, 2017
  15. May 31, 2017
    • Jeff Vander Stoep's avatar
      Verify correct application of labels and attributes · 0366afdf
      Jeff Vander Stoep authored
      With project Treble, we're relying heavily on attributes for
      permission inheritance and enforcement of separation between
      platform and vendor components.
      
      We neead tests that verify those attributes are correctly applied.
      This change adds the framework for those tests including a wrapper
      around libsepol for loading and querying policy, and a python module
      for running tests on policy and file_contexts.
      
      Included with the testing framework is a test asserting that the
      coredomain attribute is only applied to core processes. This
      verification is done using the following rules:
      1. Domain's entrypoint is on /system - coredomain
      2. Domain's entrypoint is on /vendor - not coredomain
      3. Domain belongs to a whitelist of known coredomains - coredomain
      
      In a subsequent commit these tests will be applied at build time.
      However, I first need to fix existing Treble violations exposed by
      this test. These tests will also be applied during CTS.
      
      Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \
          treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \
          -f $OUT/vendor/etc/selinux/nonplat_file_contexts \
          -f $OUT/system/etc/selinux/plat_file_contexts
      Bug: 37008075
      Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9
      0366afdf
Loading