- Jun 04, 2017
-
-
Jeff Vander Stoep authored
Consolidate ctypes boilerplate code, and other cleanup. Change-Id: I06c1d6acc9511f2f6d491c8ca2d4b630fd4120fd Test: build policy
-
- Jun 03, 2017
-
-
Chih-Hung Hsieh authored
am: 1b70d896 Change-Id: I9aaf78ffb28b8319e2011400f45f34ef93322cb3
-
TreeHugger Robot authored
* changes: Run Treble sepolicy tests at build time Fix coredomain violation for modprobe
-
Chih-Hung Hsieh authored
am: 7a31444a Change-Id: I71e33a0923e9f17c35b91172c81612d420a10c0b
-
Chih-Hung Hsieh authored
am: 05121724 Change-Id: I6c8f336aed4833d6c9f9765a8768bba4b496a40e
-
Chih-Hung Hsieh authored
am: e77d9eea Change-Id: I3e4c83d962b1a4c9fbfba83ffd0df5fc8d59c8fc
-
Treehugger Robot authored
-
Chih-Hung Hsieh authored
Owners are selected from top CL approvals or owners. They will be suggested to review/approve future CLs. Test: build/make/tools/checkowners.py -c -v OWNERS Change-Id: I3d7f4c06209c22dea0d824429d68997f7179985f
-
Josh Gao authored
-
- Jun 02, 2017
-
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build policy on Marlin Change-Id: I53748f94c5df66fa17a53e7d0bed1be6b8603544
-
Sandeep Patil authored
modprobe domain was allowed to launch vendor toolbox even if its a coredomain. That violates the treble separation. Fix that by creating a separate 'vendor_modprobe' domain that init is allowed to transition to through vendor_toolbox. Bug: 37008075 Test: Build and boot sailfish Change-Id: Ic3331797691bb5d1fdc05a674aa4aa313e1f86b2 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Josh Gao authored
Bug: http://b/62297059 Test: mma Merged-In: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc (cherry picked from commit 17885f14)
-
Josh Gao authored
Bug: http://b/62297059 Test: mma Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
- Jun 01, 2017
-
-
Andrew Scull authored
am: 39a81fd5 Change-Id: I0e7a02ff77ef0e6490a481229e042145c9dfb89a
-
Andrew Scull authored
am: e8d4bec7 Change-Id: I14ea238856a8401427b02747ebb2c5750cc5e85f
-
Andrew Scull authored
am: 60e4fd9d Change-Id: I1628907aeb743c3cb0938e7993237206523fdeb5
-
Andrew Scull authored
am: cd267450 Change-Id: I20479829d542df345275c0c2b4512788a30fba4c
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Neil Fuller authored
am: 911e236a -s ours Change-Id: I0a1cf351e40f81c1ee26bc5b722f99ae4e242b7e
-
Neil Fuller authored
Test: I solemnly swear I tested this conflict resolution. Change-Id: Icadf7c72ad173c134d3e95bb5b93c2b54b1b703e
-
Steve Muckle authored
am: 06a4b61b Change-Id: I50d8c90eaba6161e839ceb9fc87a41540e15eead
-
Steve Muckle authored
am: fc1d8d99 Change-Id: Id41f7097fd0a48739293d4f8f06f296d0f189684
-
TreeHugger Robot authored
-
Andrew Scull authored
am: 7c4f46b5 Change-Id: I88aa64b8847456f66310d632ee86929a76dfaf7b
-
Andrew Scull authored
am: b0d59450 Change-Id: If85613b84aecf43b0519bb933d925eb1829e3d5e
-
Neil Fuller authored
am: 2ff75628 Change-Id: I66cf4111e4d17e698cea7c8dc44d3294ce20a4ac
-
Neil Fuller authored
am: 34b4b737 Change-Id: If25147ce3439abd0ab4a3abc1e330b373e43d9cb
-
Steve Muckle authored
Modprobe requires this permission or the following denial will prevent loading of signed kernel modules: audit: type=1400 audit(27331649.656:4): avc: denied { search } for pid=448 comm="modprobe" scontext=u:r:modprobe:s0 tcontext=u:r:kernel:s0 tclass=key permissive=0 Bug: 62256697 Test: Verified signed module loading on sailfish. Change-Id: Idde41d1ab58e760398190d6686665a252f1823bb
-
Neil Fuller authored
Add policy changes to enable a new service. The service is currently switched off in config, but this change is needed before it could be enabled. Bug: 31008728 Test: make droid Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6 Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
-
TreeHugger Robot authored
-
- May 31, 2017
-
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
With project Treble, we're relying heavily on attributes for permission inheritance and enforcement of separation between platform and vendor components. We neead tests that verify those attributes are correctly applied. This change adds the framework for those tests including a wrapper around libsepol for loading and querying policy, and a python module for running tests on policy and file_contexts. Included with the testing framework is a test asserting that the coredomain attribute is only applied to core processes. This verification is done using the following rules: 1. Domain's entrypoint is on /system - coredomain 2. Domain's entrypoint is on /vendor - not coredomain 3. Domain belongs to a whitelist of known coredomains - coredomain In a subsequent commit these tests will be applied at build time. However, I first need to fix existing Treble violations exposed by this test. These tests will also be applied during CTS. Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \ treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \ -f $OUT/vendor/etc/selinux/nonplat_file_contexts \ -f $OUT/system/etc/selinux/plat_file_contexts Bug: 37008075 Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9
-