Skip to content
Snippets Groups Projects
  • Jeff Vander Stoep's avatar
    ed876a5e
    Fix CTS regressions · ed876a5e
    Jeff Vander Stoep authored
    Commit 7688161c "hal_*_(client|server) => hal(client|server)domain"
    added neverallow rules on hal_*_client attributes while simultaneously
    expanding these attribute which causes them to fail CTS neverallow
    tests. Remove these neverallow rules as they do not impose specific
    security properties that we want to enforce.
    
    Modify Other neverallow failures which were imposed on hal_foo
    attributes and should have been enforced on hal_foo_server attributes
    instead.
    
    Bug: 69566734
    Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \
        android.cts.security.SELinuxNeverallowRulesTest
    
        CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed
        remaining failure appears to be caused by b/68133473
    Change-Id: I83dcb33c3a057f126428f88a90b95f3f129d9f0e
    ed876a5e
    History
    Fix CTS regressions
    Jeff Vander Stoep authored
    Commit 7688161c "hal_*_(client|server) => hal(client|server)domain"
    added neverallow rules on hal_*_client attributes while simultaneously
    expanding these attribute which causes them to fail CTS neverallow
    tests. Remove these neverallow rules as they do not impose specific
    security properties that we want to enforce.
    
    Modify Other neverallow failures which were imposed on hal_foo
    attributes and should have been enforced on hal_foo_server attributes
    instead.
    
    Bug: 69566734
    Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \
        android.cts.security.SELinuxNeverallowRulesTest
    
        CtsSecurityHostTestCases completed in 7s. 627 passed, 1 failed
        remaining failure appears to be caused by b/68133473
    Change-Id: I83dcb33c3a057f126428f88a90b95f3f129d9f0e
hal_audio.te 1.10 KiB
# HwBinder IPC from client to server, and callbacks
binder_call(hal_audio_client, hal_audio_server)
binder_call(hal_audio_server, hal_audio_client)

add_hwservice(hal_audio_server, hal_audio_hwservice)
allow hal_audio_client hal_audio_hwservice:hwservice_manager find;

allow hal_audio ion_device:chr_file r_file_perms;

r_dir_file(hal_audio, proc)
r_dir_file(hal_audio, proc_asound)
allow hal_audio audio_device:dir r_dir_perms;
allow hal_audio audio_device:chr_file rw_file_perms;

# Needed to provide debug dump output via dumpsys' pipes.
allow hal_audio shell:fd use;
allow hal_audio shell:fifo_file write;
allow hal_audio dumpstate:fd use;
allow hal_audio dumpstate:fifo_file write;

###
### neverallow rules
###

# Should never execute any executable without a domain transition
neverallow hal_audio_server { file_type fs_type }:file execute_no_trans;

# Should never need network access.
# Disallow network sockets.
neverallow hal_audio_server domain:{ tcp_socket udp_socket rawip_socket } *;

# Only audio HAL may directly access the audio hardware
neverallow { halserverdomain -hal_audio_server } audio_device:chr_file *;