- Feb 13, 2018
-
-
Jeff Vander Stoep authored
To areas need better coverage: 1. Tests are not verifying that files in /data/vendor do not have the core_data_file_type attribute. 2. No error is thrown if a type lives in both /data/vendor /data/<not vendor>. Bug: 72998741 Test: build all selinux policies on master (assert build time tests) Test: build and boot Marlin and Taimen, verify no selinux denials and everything works as expected. Change-Id: I133a068123139a599b9b81ddcc254616894621eb
-
- Jan 29, 2018
-
-
Tom Cherry authored
vendor_init exists on the system partition, but it is meant to be an extention of init that runs with vendor permissions for executing vendor scripts, therefore it is not meant to be in coredomain. Bug: 62875318 Test: boot walleye Merged-In: I01af5c9f8b198674b15b90620d02725a6e7c1da6 Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
-
- Jan 25, 2018
-
-
Tom Cherry authored
vendor_init exists on the system partition, but it is meant to be an extention of init that runs with vendor permissions for executing vendor scripts, therefore it is not meant to be in coredomain. Bug: 62875318 Test: boot walleye Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
-
- Jan 19, 2018
-
-
Jeff Vander Stoep authored
"/n" --> "\n" Fixes: 72225980 Test: build (this is a build test) Change-Id: Iffd7241b4d7b9b429fff34dc2e25baad32d8008d
-
- Nov 20, 2017
-
-
Jeff Vander Stoep authored
Unconditionally compile treble_sepolicy_tests. Make compat files conditional on running the compat tests. Bug: 37008075 Test: build Change-Id: Ib3aee6e93d285ca141803a13958fbcb38b891b68
-
- Oct 04, 2017
-
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build, all tests pass. Modify some attributes locally to cause tests to fail (verify that they are actually working). Change-Id: If9f9ece61dff835f38ef9c8a57f5a7baddbae5cd
-
- Sep 28, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 26, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Aug 30, 2017
-
-
Jeff Vander Stoep authored
Prevent regression of Treble requirements. Exempt PRODUCT_FULL_TREBLE_OVERRIDE devices like Marlin. It was not launched in O-API and is not required to be fully compliant. Bug: 65115001 Test: Passes on Marlin. Passes on PRODUCT_FULL_TREBLE device. Does not pass if *_violators attributes are locally added. Change-Id: Ie720adab6ee79148c48880e0562e5bf3704c3e41
-
- Aug 24, 2017
-
-
Jeff Vander Stoep authored
searchpolicy.py provides a subset of the functionality of sesearch. The primary benefit being that it's entirely built in-tree and thus can be packaged for use in automated tests included compatibility test suites. Example searchpolicy.py --libpath out/host/linux-x86/lib64/ --allow --source domain Bug: 63397379 Test: Identical output with sesearch for the following commands --allow --source domain --allow --target domain --allow --target appdomain -p ioctl,open --allow --source lmkd -c file -p ioctl,open --allow --source lmkd -c file,dir -p ioctl,open Change-Id: I89a6c333f1f519d9171fbc1aafe27eaf5ad247f0
-
- Aug 16, 2017
-
-
Dan Cashman authored
Make sure that any attributes removed from policy are declared in the mapping file, in case they are relied upon by vendor policy. Bug: 36899958 Test: Builds successfull, but not with removed attribute not in mapping file. Change-Id: I25526cd88a50e90513ae298ccf4f2660e4627fb4
-
- Aug 14, 2017
-
-
Dan Cashman authored
The treble compatibility tests check for policy differences between old and new policy. To do this correctly, we must not modify the policy which represents the older policies. Move the files meant to be changed to a different location from the ones that are not meant to be touched to avoid any undesired changes to old policy, e.g. commit: 2bdefd65078d890889672938c6f0d2accdd25bc5 Bug: 36899958 Test: Build-time tests build. Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
-
- Aug 09, 2017
-
-
Dan Cashman authored
Also fix up set() additions in mini_parser.py and add global reference to the parser in tests for clarity. Bug: 36899958 Test: rm public type in old policy from policy and observe test failure. Change-Id: I6cba2473526798be871cd69249c9bbc6df2c5b4c
-
- Aug 08, 2017
-
-
Dan Cashman authored
Add support to the treble_sepolicy_tests suite that explicitly look at the old and current policy versions, as well as the compatibility file, to determine if any new types have been added without a compatibility entry. This first test catches the most common and likely changes that could change the type label of an object for which vendor policy may have needed access. It also should prove the basis for additional compatibility checks between old and new policies. Bug: 36899958 Test: Policy builds and tests pass. Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
-
- Jul 31, 2017
-
-
Dan Cashman authored
Test: Run test suite with no tests, CoredomainViolators, CoredomainViolations, and multiple tests arguments specified. Change-Id: Ibad30515b32eb4e1e83c8ab157c21ce4ab01365b
-
- Jun 13, 2017
-
-
Jeff Vander Stoep authored
Test that: - File types on /sys have attr sysfs_type - File types on /sys/kernel/debug have attr debugfs_type - File types on /data have attr data_file_type Test: build policy Change-Id: Ie4f1f1c7e5345da0999082962f084fdac6b85428
-
- Jun 05, 2017
-
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build policy on Marlin Change-Id: I53748f94c5df66fa17a53e7d0bed1be6b8603544 (cherry picked from commit e1ddc6df)
-
Jeff Vander Stoep authored
With project Treble, we're relying heavily on attributes for permission inheritance and enforcement of separation between platform and vendor components. We neead tests that verify those attributes are correctly applied. This change adds the framework for those tests including a wrapper around libsepol for loading and querying policy, and a python module for running tests on policy and file_contexts. Included with the testing framework is a test asserting that the coredomain attribute is only applied to core processes. This verification is done using the following rules: 1. Domain's entrypoint is on /system - coredomain 2. Domain's entrypoint is on /vendor - not coredomain 3. Domain belongs to a whitelist of known coredomains - coredomain In a subsequent commit these tests will be applied at build time. However, I first need to fix existing Treble violations exposed by this test. These tests will also be applied during CTS. Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \ treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \ -f $OUT/vendor/etc/selinux/nonplat_file_contexts \ -f $OUT/system/etc/selinux/plat_file_contexts Bug: 37008075 Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9 (cherry picked from commit 0366afdf)
-
- Jun 02, 2017
-
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build policy on Marlin Change-Id: I53748f94c5df66fa17a53e7d0bed1be6b8603544
-
- May 31, 2017
-
-
Jeff Vander Stoep authored
With project Treble, we're relying heavily on attributes for permission inheritance and enforcement of separation between platform and vendor components. We neead tests that verify those attributes are correctly applied. This change adds the framework for those tests including a wrapper around libsepol for loading and querying policy, and a python module for running tests on policy and file_contexts. Included with the testing framework is a test asserting that the coredomain attribute is only applied to core processes. This verification is done using the following rules: 1. Domain's entrypoint is on /system - coredomain 2. Domain's entrypoint is on /vendor - not coredomain 3. Domain belongs to a whitelist of known coredomains - coredomain In a subsequent commit these tests will be applied at build time. However, I first need to fix existing Treble violations exposed by this test. These tests will also be applied during CTS. Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \ treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \ -f $OUT/vendor/etc/selinux/nonplat_file_contexts \ -f $OUT/system/etc/selinux/plat_file_contexts Bug: 37008075 Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9
-