- Jun 08, 2017
-
-
Joel Scherpelz authored
am: 9381cb3d Change-Id: I3ae9005ee76b51105ec215cefc5a81c25405c482
-
Joel Scherpelz authored
am: ef1fd98b Change-Id: I6d5e2f4b43b3b52708190e8111828e54a252d5a7
-
Joel Scherpelz authored
This is used to persist RFC 7217 stable secrets across device reboots. Test: as follows - Manually tested that stable_secret is generated on first use and persists until reset of user data partition (factory reset). - Tested that "adb shell getprop" was denied access to persist.netd.stable_secret after running "adb unroot". Bug: 17613910 Change-Id: I4dad00fb189d697aceaffae49ad63987c7e45054
-
- Jun 06, 2017
-
-
Jeff Vander Stoep authored
am: e546e81b Change-Id: Iac0bb7ca4994a7921049881f94e767b34851052e
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: 1fc0682e Change-Id: I5f6adf8043686e1dbc5327b6845d710e6f673256
-
Sandeep Patil authored
am: e41af203 Change-Id: I586cf07d87339f83d66919871d1531e9b8d79c4e
-
Jeff Vander Stoep authored
am: bdfc0301 Change-Id: Ifafca851d39158cff053f4205583dd22f89070c8
-
Yabin Cui authored
This is to Allow commands like `adb shell run-as ...`. Bug: http://b/62358246 Test: run commands manually. Change-Id: I7bb6c79a6e27ff1224a80c6ddeffb7f27f492bb2
-
Josh Gao authored
It appears that selinux requires the write permission to receive a writable pipe from dumpstate, for unclear reasons. Add the permission for now. Bug: http://b/62297059 Test: dumpstate Merged-In: I0f25682177115aacd5c2203ddc0008228b0380ad Change-Id: I0f25682177115aacd5c2203ddc0008228b0380ad (cherry picked from commit 7aa08523)
-
Jeff Vander Stoep authored
On Marlin ~120 ms of time is spent relabeling /sys/devices/system/cpu every time we come out of suspend. Moving from file_contexts to genfs_contexts as the labeling mechanism knocks this down to ~3 ms. Bug: 32938130 Test: build and boot Marlin. Verify that files in /sys/devices/system/cpu have the proper label before and after suspend. Change-Id: Ie71ea7e3dd5df250cabe4ba9600afbf67e69f720
- Jun 05, 2017
-
-
Josh Gao authored
It appears that selinux requires the write permission to receive a writable pipe from dumpstate, for unclear reasons. Add the permission for now. Bug: http://b/62297059 Test: dumpstate Change-Id: I0f25682177115aacd5c2203ddc0008228b0380ad
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build policy on Marlin Change-Id: I53748f94c5df66fa17a53e7d0bed1be6b8603544 (cherry picked from commit e1ddc6df)
-
Sandeep Patil authored
modprobe domain was allowed to launch vendor toolbox even if its a coredomain. That violates the treble separation. Fix that by creating a separate 'vendor_modprobe' domain that init is allowed to transition to through vendor_toolbox. Bug: 37008075 Test: Build and boot sailfish Change-Id: Ic3331797691bb5d1fdc05a674aa4aa313e1f86b2 Signed-off-by:
Sandeep Patil <sspatil@google.com> (cherry picked from commit 9e366a0e)
-
Jeff Vander Stoep authored
With project Treble, we're relying heavily on attributes for permission inheritance and enforcement of separation between platform and vendor components. We neead tests that verify those attributes are correctly applied. This change adds the framework for those tests including a wrapper around libsepol for loading and querying policy, and a python module for running tests on policy and file_contexts. Included with the testing framework is a test asserting that the coredomain attribute is only applied to core processes. This verification is done using the following rules: 1. Domain's entrypoint is on /system - coredomain 2. Domain's entrypoint is on /vendor - not coredomain 3. Domain belongs to a whitelist of known coredomains - coredomain In a subsequent commit these tests will be applied at build time. However, I first need to fix existing Treble violations exposed by this test. These tests will also be applied during CTS. Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \ treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \ -f $OUT/vendor/etc/selinux/nonplat_file_contexts \ -f $OUT/system/etc/selinux/plat_file_contexts Bug: 37008075 Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9 (cherry picked from commit 0366afdf)
-
- Jun 03, 2017
-
-
Chih-Hung Hsieh authored
am: 7a31444a Change-Id: I71e33a0923e9f17c35b91172c81612d420a10c0b
-
Chih-Hung Hsieh authored
am: 05121724 Change-Id: I6c8f336aed4833d6c9f9765a8768bba4b496a40e
-
Chih-Hung Hsieh authored
am: e77d9eea Change-Id: I3e4c83d962b1a4c9fbfba83ffd0df5fc8d59c8fc
-
Treehugger Robot authored
-
Chih-Hung Hsieh authored
Owners are selected from top CL approvals or owners. They will be suggested to review/approve future CLs. Test: build/make/tools/checkowners.py -c -v OWNERS Change-Id: I3d7f4c06209c22dea0d824429d68997f7179985f
-
Josh Gao authored
-
- Jun 02, 2017
-
-
Josh Gao authored
Bug: http://b/62297059 Test: mma Merged-In: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc (cherry picked from commit 17885f14)
-
Josh Gao authored
Bug: http://b/62297059 Test: mma Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
- Jun 01, 2017
-
-
Andrew Scull authored
am: 60e4fd9d Change-Id: I1628907aeb743c3cb0938e7993237206523fdeb5
-
Andrew Scull authored
am: cd267450 Change-Id: I20479829d542df345275c0c2b4512788a30fba4c
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Neil Fuller authored
Test: I solemnly swear I tested this conflict resolution. Change-Id: Icadf7c72ad173c134d3e95bb5b93c2b54b1b703e
-
Steve Muckle authored
am: fc1d8d99 Change-Id: Id41f7097fd0a48739293d4f8f06f296d0f189684
-