- Jun 16, 2017
-
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 3692b318 Change-Id: I8affb6f117f842ebdf083ec24083e190dde0082a
-
Sandeep Patil authored
am: d3381cd9 Change-Id: I33215b5c9d894823f3928742a8712ef42d803156
-
Sandeep Patil authored
* changes: build: run neverallow checks on platform sepolicy radio: disalllow radio and rild socket for treble devices
-
- Jun 15, 2017
-
-
Dan Cashman authored
CTS checks to make sure that the _contexts files on a device have a superset of the AOSP entries. This was removed due to concurrent master and DR development. Restore the entry to allow CTS to pass. Bug: 38241921 Bug: 62348859 Test: Policy builds and is identical to oc-dev for prop ctxts. Change-Id: I87ccbee7aadee57b8e46ede73280810362b618c0
-
- Jun 14, 2017
-
-
Carmen Jackson authored
am: e9381d5e Change-Id: I784011fc804dd43f431be62804761b100846dfbf
-
Carmen Jackson authored
Now that we're expected to use this when taking traces, we need to add this permission so that Traceur can also access this file. Test: Used Traceur and saw the traces appear in the bugreports directory, as expected. Bug: 62493544 Change-Id: Ib4304176abbb51e2e3b45c566ff14574e1cfaa82 Merged-In: I464b0df30fabfc5f1c7cd7430e53e8d04bfacb53 (this merged-in is not the same change; it's a conflicting change in master)
-
Sandeep Patil authored
This will prevent us from breaking our own neverallow rules in the platform sepolicy regardless of vendor policy adding exceptions to the neverallow rules using "*_violators" attributes Bug: 62616897 Bug: 62343727 Test: Build policy for sailfish Test: Build policy with radio to rild socket rule enabled for all and ensure the build fails Change-Id: Ic66ec3e10c76a7c9a17669e0d3deb3a1c7b00809 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
This violates the socket comms ban between coredomain (radio) and non coredomain (rild) in the platform policy. Bug: 62616897 Bug: 62343727 Test: Build and boot sailfish Change-Id: I48303bbd8b6eb62c120a551d0f584b9733fc2d43 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
- Jun 13, 2017
-
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I87eb8bad11fc9c011289b8d97219835a08d18cd1
-
Jeff Vander Stoep authored
[ 7.674739] selinux: selinux_android_file_context: Error getting file context handle (No such file or directory) Bug: 62564629 Test: build and flash marlin. Successfully switch between regular and recovery modes Change-Id: I0f871f8842d95322c844fb7b13ad1b4b42578e35
-
- Jun 12, 2017
-
-
Jeff Vander Stoep authored
am: 7a68c5ae Change-Id: Ic9f658984340b255114bb0f8d505fa6774f1cb04
-
- Jun 10, 2017
-
-
Jeff Vander Stoep authored
This change is primarily to fix CTS which checks file ordering of file_contexts. Having two separate means of loading file_contexts has resulted in ordering variations. Previously the binary file_contexts was preferred since it loaded faster. However with the move to libpcre2, there is no difference in loading time between text and binary file_contexts. This leaves us with build system complexity with no benefit. Thus removing this unnecessary difference between devices. Bug: 38502071 Test: build and boot non-Treble Bullhead, run CTS tests below Test: build and boot Treble Marlin, run CTS tests below Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testAospFileContexts Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testValidFileContexts Change-Id: I088b3aeafaaab320f6658feb058a1fb89cbb65e1
-
Jeff Vander Stoep authored
This change is primarily to fix CTS which checks file ordering of file_contexts. Having two separate means of loading file_contexts has resulted in ordering variations. Previously the binary file_contexts was preferred since it loaded faster. However with the move to libpcre2, there is no difference in loading time between text and binary file_contexts. This leaves us with build system complexity with no benefit. Thus removing this unnecessary difference between devices. Bug: 38502071 Test: build and boot non-Treble Bullhead, run CTS tests below Test: build and boot Treble Marlin, run CTS tests below Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testAospFileContexts Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testValidFileContexts Change-Id: I088b3aeafaaab320f6658feb058a1fb89cbb65e1
-
Jerry Zhang authored
-
- Jun 08, 2017
-
-
Dan Cashman authored
This reverts commit 50889ce0. Bug: 62427402 Test: Build and boot. Change-Id: I32eae7997c901981d3228b61f33322a7c2c84301
-
Jerry Zhang authored
This reverts commit c147b592. The new domain changed neverallows, breaking CTS compatability. Revert the domain now, with the intention to re-add for the next release. Bug: 62102757 Test: domain is set to priv_app Change-Id: I907ff7c513cd642a306e3eaed3937352ced90005
-
- Jun 06, 2017
-
-
TreeHugger Robot authored
-
Dan Cashman authored
Copy the final system sepolicy from oc-dev to its prebuilt dir corresponding to its version (26.0) so that we can uprev policy and start maintaining compatibility files, as well as use it for CTS tests targeting future platforms. Bug: 37896931 Test: none, this just copies the old policy. Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: c6ba60d8 Change-Id: I1a091cb4715577db620ec5e0b3e3dabfcd15ee6a
-
Jeff Vander Stoep authored
am: e546e81b Change-Id: Iac0bb7ca4994a7921049881f94e767b34851052e
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Dan Cashman authored
checkseapp does not expect filenames before the appearance of neverallow rules against which to check. They had previously been hidden by default because they were only gathered from one file, but with the addition of the BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to allow for /system policy extensions, this may change. Bug: 36467375 Bug: 62357603 Test: Builds with seapp_contexts extension. Change-Id: I270bd60ae368aa3c082299d57c4bf12936ac2073
-
Jeff Vander Stoep authored
On Marlin ~120 ms of time is spent relabeling /sys/devices/system/cpu every time we come out of suspend. Moving from file_contexts to genfs_contexts as the labeling mechanism knocks this down to ~3 ms. Bug: 32938130 Test: build and boot Marlin. Verify that files in /sys/devices/system/cpu have the proper label before and after suspend. Change-Id: Ie71ea7e3dd5df250cabe4ba9600afbf67e69f720
-
Jeff Vander Stoep authored
am: c85b8596 -s ours Change-Id: I32f3b92444637ac4f62b53bc7b66daa64c6bd7dd
-
Sandeep Patil authored
am: 0a53f1d4 Change-Id: I15df35ef6ab490530d20bfca4cab168607b72668
-
Jeff Vander Stoep authored
am: 8ae0bd62 -s ours Change-Id: I53305cfdaa523542b6795bd1c31c7eaa6e3b91af
-
Jeff Vander Stoep authored
am: 1fc0682e Change-Id: I5f6adf8043686e1dbc5327b6845d710e6f673256
-
Sandeep Patil authored
am: e41af203 Change-Id: I586cf07d87339f83d66919871d1531e9b8d79c4e
-
Jeff Vander Stoep authored
am: bdfc0301 Change-Id: Ifafca851d39158cff053f4205583dd22f89070c8
-
Yabin Cui authored
This is to Allow commands like `adb shell run-as ...`. Bug: http://b/62358246 Test: run commands manually. Change-Id: I7bb6c79a6e27ff1224a80c6ddeffb7f27f492bb2