- Nov 22, 2017
-
-
Michael Wright authored
This reverts commit ba2130a8. Test: lunch elfin-userdebug && m -j Change-Id: I83e8a37cac97e2f994fd2defb94888ec73b41f3b
-
Jiyong Park authored
am: 7fdcf323 Change-Id: Ie897222e6b3fd0ef04dd253e17a65646f399c6af
-
Jiyong Park authored
am: 07d9f7e0 Change-Id: Ide0eeeffeee3e6081e2f46f04eb837cdc50ab643
-
Jiyong Park authored
am: 5086506a Change-Id: Icf4ba89621620ac7c624dc1d680bf61f807e163e
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: d5931d97 Change-Id: Ic4eb8ed411864915d479c8a520a14119c818f196
-
Jeff Vander Stoep authored
am: 7dc46564 Change-Id: I104adbce8a2392377b18f1ffc24d591724d5d3db
-
Jeff Vander Stoep authored
am: 6a28b68d Change-Id: I774787b48c0b5f6f20313ee6f9c8062db4072e84
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Commit 7688161c "hal_*_(client|server) => hal(client|server)domain" added neverallow rules on hal_*_client attributes while simultaneously expanding these attribute which causes them to fail CTS neverallow tests. Remove these neverallow rules as they do not impose specific security properties that we want to enforce. Modify Other neverallow failures which were imposed on hal_foo attributes and should have been enforced on hal_foo_server attributes instead. Bug: 69566734 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed remaining failure appears to be caused by b/68133473 Test: build taimen-user/userdebug Change-Id: I619e71529e078235ed30dc06c60e6e448310fdbc
-
Jiyong Park authored
In P, we will be supporting privileged apps in vendor partition, thus need to label /vendor/priv-app as vendor_app_file so that apps can exist under the dir. Bug: 35301609 Test: N/A since there is no /vendor/priv-app yet. Framework change which is currently in the internal is required. Change-Id: I86a765ef9da5267113e64a7cbb38ba0abf5c2835
-
Nick Kralevich authored
am: da071ea1 Change-Id: I6b400fd0996c103c98bb6f6c00c6ef58cd83d566
-
Nick Kralevich authored
am: 5a30dc36 Change-Id: I5e5a7d55814a03d9e4cd8da851856be2bbbb14f0
-
Nick Kralevich authored
am: 4fbbd147 Change-Id: I304c54a480b150a8c910f268ccf84869dfb7e3f5
-
Treehugger Robot authored
-
- Nov 21, 2017
-
-
Courtney Goeltzenleuchter authored
am: c151962e Change-Id: I819cbfdc586651c5f7ba64aedb6a66432ad174da
-
Courtney Goeltzenleuchter authored
am: 4fb7f127 Change-Id: Id5194fd7303fbc43d9139fd56d438b66805f3ab4
-
Courtney Goeltzenleuchter authored
am: 0629dedc Change-Id: I576b7b98ba147c97a992ea3c65239060c4cec51e
-
Courtney Goeltzenleuchter authored
-
Nick Kralevich authored
Remove a number of SELinux rules which were required to support file based OTA. After this, we can have a much stronger assertion that files on /system are immutable. Tighten up the neverallow rules at the same time. Bug: 35853185 Bug: 15575013 Test: adb reboot recovery && adb sideload [file] Change-Id: I4238d17808bed6a81f47e14eb1797496c07642e2
-
Jeffrey Vander Stoep authored
am: 5b295d30 Change-Id: I0f18c8fd43bfbce55c883f35ef27499c840e0ca0
-
Jeffrey Vander Stoep authored
am: 54242ffa Change-Id: I3879dd096cddf7dbf8e3a83b2a708ed14ff334b5
-
Jeffrey Vander Stoep authored
am: 18cb4dae Change-Id: Ibbaef489e45195aa105b6df09bb7378481ab2d06
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
am: 7a1af958 Change-Id: I19c63133e7ecf5dbbb9feeac9efc72d627448af2
-
Jeffrey Vander Stoep authored
am: 51aba79e Change-Id: If96c3cc3609531b26fd08eeccfd270c0aaf9400c
-
Jeffrey Vander Stoep authored
am: cd69bebf Change-Id: I6f3c20144c971d5040ee325e8bc0e9cff70085a0
-
Jeffrey Vander Stoep authored
This reverts commit ed876a5e. Fixes user builds. libsepol.report_failure: neverallow on line 513 of system/sepolicy/public/domain.te (or line 9149 of policy.conf) violated by allow update_verifier misc_block_device:blk_file { ioctl read write lock append open }; libsepol.check_assertions: 1 neverallow failures occurred Error while expanding policy Bug: 69566734 Test: build taimen-user Change-Id: I969b7539dce547f020918ddc3e17208fc98385c4
-
Jeff Vander Stoep authored
am: 32663d46 Change-Id: I17de5133481362dc5d8d102745c31fc8b0e797cd
-
Jeff Vander Stoep authored
am: c76a25c1 Change-Id: Id19c777177f6fa76ced96986017aa83000bca002
-
Jeff Vander Stoep authored
am: ed876a5e Change-Id: Ic41e1b997968acfd68ade6e9b9901a4dd9b8d2d2
-
Jeff Vander Stoep authored
Commit 7688161c "hal_*_(client|server) => hal(client|server)domain" added neverallow rules on hal_*_client attributes while simultaneously expanding these attribute which causes them to fail CTS neverallow tests. Remove these neverallow rules as they do not impose specific security properties that we want to enforce. Modify Other neverallow failures which were imposed on hal_foo attributes and should have been enforced on hal_foo_server attributes instead. Bug: 69566734 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed remaining failure appears to be caused by b/68133473 Change-Id: I83dcb33c3a057f126428f88a90b95f3f129d9f0e
-
Benjamin Gordon authored
am: 44957a90 Change-Id: I363639d2cdf70b1772da3d6c7f7c814554063dfc
-
Benjamin Gordon authored
am: d41e6161 Change-Id: I334e4579f1ca0543a2f98b60537afa4325d3ab6f
-
Benjamin Gordon authored
am: b9ea282c Change-Id: I77676d7adb39747b9195489ef83d72e57cdb3b59
-
Benjamin Gordon authored
-
Courtney Goeltzenleuchter authored
Test: build Bug: 63710530 Change-Id: I85cddfaf3ec004165040935f8723e9eed0ef7900
-
Jeff Vander Stoep authored
am: 496f9461 Change-Id: I9b2548e2116deac8960b57878b41ad14aea05523
-
Jeff Vander Stoep authored
am: 246b8071 Change-Id: I24fc854f684cc19a2af7fef367970f6dd7be6d3b
-
Jeff Vander Stoep authored
am: 11c5700f Change-Id: I10a19ad706d053e1a7a8e9f5d07d7c30aad0a053
-