- Feb 14, 2018
-
-
Jeff Vander Stoep authored
The intent of this flag is to disable tests during early device bringup so that vendor drops can occur without build breakages. When SELINUX_IGNORE_NEVERALLOWS=true also disable labeling tests sepolicy_tests, and treble_sepolicy_tests. Bug: 73322735 Test: build, verify known tests failures do not cause build breakage. Change-Id: I3e7165938d4e34c066bfa0a20e68b7e02dae4a24
-
- Feb 07, 2018
-
-
Yifan Hong authored
This is a list of sepolicy versions that the framework supports. Test: builds and boots Bug: 67920434 Change-Id: I0f408fa3967214b47a64101760dbbb2542023dcf
-
Yifan Hong authored
Test: m framework_compatibility_matrix.xml -j Test: device boots Bug: 67920434 Bug: 69390067 Change-Id: I3461873c22f704b9bbaa3a4e6f7e1df34d6b61a3
-
- Feb 06, 2018
-
-
Tri Vo authored
Bug: 69390067 Test: 27.0.cil is installed to /system/etc/selinux/mapping/27.0.cil Change-Id: If5b37ca7920a66b4fceaa031b6e8e9bafd18ac47
-
- Feb 05, 2018
-
-
Jaekyun Seok authored
The feature of compatible property has its own neverallow rules and it is enforced on devices launchig with Android P. This CL changes hal_nfc to hal_nfc_server in neverallow rules because sepolicy-analyze doesn't recognize it. Additionally one more neverallow rule is added to restrict reading nfc_prop. Bug: 72013705 Bug: 72678352 Test: 'run cts -m CtsSecurityHostTestCases' on walleye with ro.product.first_api_level=28 Change-Id: I753cc81f7ca0e4ad6a2434b2a047052678f57671
-
Bowgo Tsai authored
Current sepolicy CIL files are built by several command-line tools in Android.mk. This change extracts some of the build logic into a python script to relief the effort in Android.mk. The first command is `build_sepolicy build_cil`. It's possible to add more sub-commands under the build_sepolicy script in the future. Bug: 64240127 Test: build bullhead/taimen Change-Id: Ie0ae4fc5256a550c72954cde5d5dd213a22d159a
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot bullhead/taimen Change-Id: Iea2210c9c8ab30c9ecbcd8146f074e76e90e6943
-
- Feb 02, 2018
-
-
Bowgo Tsai authored
This reverts commit 9aa8496f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build Change-Id: I77671a74cd952544a1dbb3daabc2bb449a7c2cf2
-
Bowgo Tsai authored
This reverts commit 3506ad3f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build
-
- Jan 31, 2018
-
-
Bowgo Tsai authored
Current sepolicy CIL files are built by several command-line tools in Android.mk. This change extracts some of the build logic into a python script to relief the effort in Android.mk. The first command is `build_sepolicy build_cil`. It's possible to add more sub-commands under the build_sepolicy script in the future. Bug: 64240127 Test: build and boot a device Test: checks the content of $OUT/vendor/etc/selinux/vendor_sepolicy.cil is the same as before Change-Id: I0b64f1088f413172e97b579b4f7799fa392762df
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: Iea87a502bc6191cfaf8a2201f29e4a2add4ba7bf
-
- Jan 12, 2018
-
-
Joel Galenson authored
This patch adds a flag that can be used to ignore neverallow rules. By adding SELINUX_IGNORE_NEVERALLOWS := true into the BoardConfig.mk file, neverallow violations will be ignored silently. This flag can only be enabled on userdebug and eng builds. Users of this flag should be very careful. Since it does not work on user builds, it must be disabled to pass CTS, and enabling it for too long could hide issues that need to be addressed. As a happy side effect, this patch should also improve the error messages when violating a neverallow rules. Specifically, the file and line number should be correct. Bug: 70950899 Bug: 33960443 Test: Built walleye-{user,eng} with and without this new option and a neverallow violation. Built policy for all targets. Change-Id: Id0d65123cdd230d6b90faa6bb460d544054bb906
-
- Jan 10, 2018
-
-
Jaekyun Seok authored
This CL lists all the exported platform properties in private/exported_property_contexts. Additionally accessing core_property_type from vendor components is restricted. Instead public_readable_property_type is used to allow vendor components to read exported platform properties, and accessibility from vendor_init is also specified explicitly. Note that whitelisting would be applied only if PRODUCT_COMPATIBLE_PROPERTY is set on. Bug: 38146102 Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
-
- Jan 04, 2018
-
-
Tom Cherry authored
1) fc_sort is not needed as there is no reason to sort system properties, so this is removed and replaced with a simply copy 2) Use the new property_info_checker instead of checkfc for validating property information. This supports exact match properties and will be extended to verify property schemas in the future. Bug: 36001741 Test: verify bullhead's property contexts correct Test: verify faulty property contexts result in failures Change-Id: Id9bbf401f385206e6907449a510e3111424ce59e
-
- Dec 07, 2017
-
-
Bo Hu authored
This reverts commit 8b562206. Reason for revert: broke mac build b/70273082 FAILED: out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil /bin/bash -c "(out/host/darwin-x86/bin/version_policy -b out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil -t out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil -n 10000.0 -o out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp ) && (grep -Fxv -f out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp > out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil ) && (out/host/darwin-x86/bin/secilc -m -M true -G -N -c 30 out/target/product/generic_x86/obj/ETC/plat_sepolicy.cil_intermediates/plat_sepolicy.cil out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/10000.0.cil_intermediates/10000.0.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil -o /dev/null -f /dev/null )" Parsing out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil Parsing out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil grep: out of memory Change-Id: I14f0801fdd6b9be28e53dfcc0f352b844005db59
-
- Dec 06, 2017
-
-
kaichieh authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: I53a9715b2f9ddccd214f4cf9ef081ac426721612
-
- Nov 20, 2017
-
-
Jeff Vander Stoep authored
Unconditionally compile treble_sepolicy_tests. Make compat files conditional on running the compat tests. Bug: 37008075 Test: build Change-Id: Ib3aee6e93d285ca141803a13958fbcb38b891b68
-
- Nov 10, 2017
-
-
Steven Moreland authored
PRODUCT_FULL_TREBLE is being broken up into smaller, more manageable components. Bug: 62019611 Test: manual Change-Id: I9b65f120851d9ea134a0059a417f0282777717fc
-
- Oct 18, 2017
-
-
Dan Cashman authored
This file is necessary for using an mr1 system image in conjunction with an oc-dev vendor image. This is currently needed by GSI testing, for example. (cherry-pick of commit: 03596f28) Bug: 66358348 Test: File is included on system image. Change-Id: Ie694061d08acf17453feb596480e42974f8c714c
-
- Oct 07, 2017
-
-
Jeff Vander Stoep authored
Allows partners to add a new attribute definition to their public policy without causing a compatibility failure with the AOSP system image. Bug: 67092827 Bug: 37915794 Test: build and boot aosp_sailfish with new type declared in public policy Change-Id: I015c26fa7c399423e8a6e7079b5689007d031479
-
- Oct 05, 2017
-
-
Jeff Vander Stoep authored
FAILED: out/target/product/sailfish/obj/ETC/treble_sepolicy_tests_intermediates/treble_sepolicy_tests Error: library-path out/host/darwin-x86/lib64/libsepolwrap.so does not exist Note, fixing here instead of reverting to avoid reverting changes in CTS. Test: ctate testing on Mac Change-Id: I95f483b152d9bece1a16267cbc49eedb1f902990
-
- Oct 04, 2017
-
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build, all tests pass. Modify some attributes locally to cause tests to fail (verify that they are actually working). Change-Id: If9f9ece61dff835f38ef9c8a57f5a7baddbae5cd
-
Jeff Vander Stoep authored
This is a necessary for enforcing these tests in CTS. Bug: 37008075 Test: build Change-Id: I36b4ce71c26a0ba01cd0289fe363f0a9f7db1214 (cherry picked from commit 8d614b3f)
-
- Oct 03, 2017
-
-
Daniel Cashman authored
This reverts commit f9cd76b1. Change-Id: I4f753f3159b422fbca94be78e620bee2c39de38a
-
- Oct 02, 2017
-
-
Dan Cashman authored
Bug: 67018095 Test: None. Relying on treehugger. Change-Id: I68221183cf56b666c81f224a533b56a0761f8c15
-
Dan Cashman authored
This file is necessary for using an mr1 system image in conjunction with an oc-dev vendor image. This is currently needed by GSI testing, for example. (cherry-pick of commit: 03596f28) Bug: 66358348 Test: File is included on system image. Change-Id: I3a6b7ed5edf1c07941bbf835e70f2ae8d03fee25
-
- Sep 28, 2017
-
-
Dan Cashman authored
This file is necessary for using an mr1 system image in conjunction with an oc-dev vendor image. This is currently needed by GSI testing, for example. Bug: 66358348 Test: File is included on system image. Change-Id: I3a6b7ed5edf1c07941bbf835e70f2ae8d03fee25
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 27, 2017
-
-
William Roberts authored
sort respects locale settings, so the value of LC_ALL can affect how sort orders things. This can cause labeling issues. More information on locale and sort can be found via: * locale(1) - man 1 locale * sort(1) - man 1 sort * https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28539 Rather than deal with this locale setting use fc_sort on property contexts. This also has the side-effect of stripping comments, and thus sed can be dropped. Test: This was tested by: * comparing outputs to previous runs * compile tested *only*. Change-Id: I1e1eb4dff76f717b5f82f697e677a108abb69892 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
William Roberts authored
sort respects locale settings, so the value of LC_ALL can affect how sort orders things. Issues have surfaced when CTS build servers locale differs from image build server locale. And thus the prologue of property_contexts differs with what CTS was expecting. More information on locale and sort can be found via: * locale(1) - man 1 locale * sort(1) - man 1 sort * https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28539 Rather than deal with this locale setting use fc_sort on property contexts. This also has the side-effect of stripping comments, and thus sed can be dropped. Test: This was tested by: * comparing outputs to previous runs * booting the x86-64 emulator Change-Id: I144ef549cc11d9c61849ffc0e1b1b000f1b8d1a8 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Sep 26, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 25, 2017
-
-
Jeff Vander Stoep authored
Fixes: 65263013 Test: build Merged-In: I0ec412481c5990927fcbee7c4303bee2da876210 Change-Id: I0ec412481c5990927fcbee7c4303bee2da876210 (cherry picked from commit 5c5e79cd)
-
- Sep 23, 2017
-
-
Jeff Vander Stoep authored
Fixes: 65263013 Test: build Merged-In: I0ec412481c5990927fcbee7c4303bee2da876210 Change-Id: I0a5b9a80e988fcd16a29807ed83b2c65bba9000f
-
- Sep 06, 2017
-
-
Hung-ying Tyan authored
On full Treble devices, servicemanager should only host services served from processes on /system; nonplat_service_contexts should not be created at all in this case. Bug: 36866029 Test: Build marlin and make sure nonplat_service_contexts is not created. Change-Id: Id02c314abbb98fc69884198779488c52231d22c3 Merged-In: Id02c314abbb98fc69884198779488c52231d22c3
-
- Aug 25, 2017
-
-
Dan Cashman authored
Bug: 36899958 Test: Builds 'n' boots. Change-Id: I5836a18f9d0a9a976dda7304045e3b9e1e84565e Merged-In: I5836a18f9d0a9a976dda7304045e3b9e1e84565e (cherry picked from commit c0713e86)
-
- Aug 23, 2017
-
-
Michael Wright authored
Bug: 64982450 Test: manual Change-Id: Ic5d25b8a12271e5bfa71e30843a36fb643b914ff
-
Jeff Vander Stoep authored
Some selinux build packages are defined in embedded.mk, others are defined in system/sepolicy/Android.mk. Move all to sepolicy as a dependency of the phony package selinux_policy which is defined in embedded.mk. Test: build Marlin (Treble) and Angler (non-Treble) Merged-In: Ib0443ad3da600447fbb51f2e9f91de04dcf5f9f6 Change-Id: Ib0443ad3da600447fbb51f2e9f91de04dcf5f9f6
-
- Aug 14, 2017
-
-
Dan Cashman authored
The treble compatibility tests check for policy differences between old and new policy. To do this correctly, we must not modify the policy which represents the older policies. Move the files meant to be changed to a different location from the ones that are not meant to be touched to avoid any undesired changes to old policy, e.g. commit: 2bdefd65078d890889672938c6f0d2accdd25bc5 Bug: 36899958 Test: Build-time tests build. Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
-
- Aug 08, 2017
-
-
Dan Cashman authored
Add support to the treble_sepolicy_tests suite that explicitly look at the old and current policy versions, as well as the compatibility file, to determine if any new types have been added without a compatibility entry. This first test catches the most common and likely changes that could change the type label of an object for which vendor policy may have needed access. It also should prove the basis for additional compatibility checks between old and new policies. Bug: 36899958 Test: Policy builds and tests pass. Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
-
- Jul 11, 2017
-
-
Dan Cashman authored
Bug: 36899958 Test: Builds 'n' boots. Change-Id: I5836a18f9d0a9a976dda7304045e3b9e1e84565e
-