Skip to content
Snippets Groups Projects
  1. Jan 31, 2017
    • Calin Juravle's avatar
      Remove SElinux audit to libart_file · 01ee59a7
      Calin Juravle authored
      Since it was introduced it caused quite a few issues and it spams the
      SElinux logs unnecessary.
      
      The end goal of the audit was to whitelist the access to the
      interpreter. However that's unfeasible for now given the complexity.
      
      Test: devices boots and everything works as expected
            no more auditallow logs
      
      Bug: 29795519
      Bug: 32871170
      Change-Id: I9a7a65835e1e1d3f81be635bed2a3acf75a264f6
      01ee59a7
    • Alex Klyubin's avatar
      9e90f83e
    • Mark Salyzyn's avatar
      logd: restrict access to /dev/event-log-tags · d33a9a19
      Mark Salyzyn authored
      Create an event_log_tags_file label and use it for
      /dev/event-log-tags.  Only trusted system log readers are allowed
      direct read access to this file, no write access.  Untrusted domain
      requests lack direct access, and are thus checked for credentials via
      the "plan b" long path socket to the event log tag service.
      
      Test: gTest logd-unit-tests, liblog-unit-tests and logcat-unit-tests
      Bug: 31456426
      Bug: 30566487
      Change-Id: Ib9b71ca225d4436d764c9bc340ff7b1c9c252a9e
      d33a9a19
    • Alex Klyubin's avatar
      Device-agnostic policy for vendor image · 5596172d
      Alex Klyubin authored
      Default HAL implementations are built from the platform tree and get
      placed into the vendor image. The SELinux rules needed for these HAL
      implementations to operate thus need to reside on the vendor
      partition.
      
      Up to now, the only place to define such rules in the source tree was
      the system/sepolicy/public directory. These rules are placed into the
      vendor partition. Unfortunately, they are also placed into the
      system/root partition, which thus unnecessarily grants these rules to
      all HAL implementations of the specified service, default/in-process
      shims or not.
      
      This commit adds a new directory, system/sepolicy/vendor, whose
      rules are concatenated with the device-specific rules at build time.
      These rules are thus placed into the vendor partition and are not
      placed into the system/root partition.
      
      Test: No change to SELinux policy.
      Test: Rules placed into vendor directory end up in nonplat* artefacts,
            but not in plat* artefacts.
      Bug: 34715716
      Change-Id: Iab14aa7a3311ed6d53afff673e5d112428941f1c
      5596172d
    • Treehugger Robot's avatar
      04641948
    • Treehugger Robot's avatar
      81a73508
  2. Jan 30, 2017
  3. Jan 29, 2017
  4. Jan 27, 2017
    • Janis Danisevskis's avatar
      Preliminary policy for hal_keymaster (TREBLE) · e8acd769
      Janis Danisevskis authored
      This adds the premissions required for
      android.hardware.keymaster@2.0-service to access the keymaster TA
      as well as for keystore and vold to lookup and use
      android.hardware.keymaster@2.0-service.
      
      IT DOES NOT remove the privileges from keystore and vold to access
      the keymaster TA directly.
      
      Test: Run keystore CTS tests
      Bug: 32020919
      
      (cherry picked from commit 5090d6f3)
      
      Change-Id: Ib02682da26e2dbcabd81bc23169f9bd0e832eb19
      e8acd769
    • Alex Klyubin's avatar
      Remove hal_light from system_server domain · 384a73de
      Alex Klyubin authored
      HAL clients should not be annotated with hal_x and haldomain. This may
      grant them too much access. Instead, the policy needed for using
      in-process HALs should be directly embedded into the client's domain
      rules.
      
      Test: Boot sailfish, adjust screen brightness from the system UI, no
            SELinux denials for system_server to do with sysfs_leds.
      Bug: 34715716
      
      Change-Id: Iccb4224d770583e3c38930e8562723d57d283077
      384a73de
    • Alex Klyubin's avatar
      Move webview_zygote policy to private · a7653ee2
      Alex Klyubin authored
      This leaves only the existence of webview_zygote domain and its
      executable's webview_zygote_exec file label as public API. All other
      rules are implementation details of this domain's policy and are thus
      now private.
      
      Test: Device boots, with Multiproces WebView developer setting
            enabled, apps with WebView work fine. No new denials.
      Bug: 31364497
      
      Change-Id: I179476c43a50863ee3b327fc5155847d992a040d
      a7653ee2
    • Treehugger Robot's avatar
      Merge "sepolicy for usb hal" · deefb433
      Treehugger Robot authored
      deefb433
    • Treehugger Robot's avatar
      Merge "Dumpstate: hwbinder_use" · aa10429b
      Treehugger Robot authored
      aa10429b
    • Badhri Jagan Sridharan's avatar
      sepolicy for usb hal · ae206f16
      Badhri Jagan Sridharan authored
      Bug: 31015010
      
      cherry-pick from b6e4d4bd
      
      Test: checked for selinux denial msgs in the dmesg logs.
      Change-Id: I8285ea05162ea0d75459e873e5c2bad2dbc7e5ba
      ae206f16
  5. Jan 26, 2017
    • Treehugger Robot's avatar
      6d26506c
    • Steven Moreland's avatar
      Dumpstate: hwbinder_use · ba68f554
      Steven Moreland authored
      Dumpstate needs the hwbinder_use permission in order to talk to hardware
      services.
      
      Bug: 34709307
      Test: no denials submitting bugreport
      Change-Id: Ic51da5371cd346c0fa9fb3881a47adaf53c93566
      ba68f554
    • Sandeep Patil's avatar
      Fix cleanspec for property_contexts · 4ca1f427
      Sandeep Patil authored
      
      The CLs that split the property_contexts at
      topic:prop_ctx_split status:merged broke incremental build,
      which was later fixed in I22ecd1d3698404df352263fa99b56cb65247a23b.
      
      The prop_ctx CLs were later reverted due to updater breakage as in
      b/34370523. So, this change adds the property_contexts clean steps
      to fix the incremental builds
      
      Change-Id: Ic32b144dbfada3a6c34f9502099220e7e3c63682
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      4ca1f427
    • Alex Klyubin's avatar
      Move zygote policy to private · 966efede
      Alex Klyubin authored
      This leaves only the existence of zygote domain and its
      executable's zygote_exec file label as public API. All other rules are
      implementation details of this domain's policy and are thus now
      private.
      
      Test: Device boot, apps (untrusted_app, system_app, platform_app,
            priv_app) work fine. No new denials.
      Bug: 31364497
      Change-Id: Ie37128531be841b89ecd602992d83d77e26533bc
      966efede
    • Alex Klyubin's avatar
      Move appdomain policy to private · 8429a331
      Alex Klyubin authored
      This leaves only the existence of appdomain attribute as public API.
      All other rules are implementation details of this attribute's policy
      and are thus now private.
      
      Test: Device boot, apps (untrusted_app, system_app, platform_app,
            priv_app) work fine. No new denials.
      Bug: 31364497
      
      Change-Id: Ie22e35bad3307bb9918318c3d034f1433d51677f
      8429a331
    • Alex Klyubin's avatar
      Remove hal_gatekeeper from gatekeeperd domain · 6fe344e3
      Alex Klyubin authored
      HAL clients should not be annotated with hal_x and haldomain. This may
      grant them too much access. Instead, the policy needed for using
      in-process HALs should be directly embedded into the client's domain
      rules.
      
      This partially reverts the moving of rules out of gatekeeperd in
      commit a9ce2086.
      
      Test: Set up PIN-protected secure lock screen, unlock screen, reboot,
            unlock. No SELinux denials in gatekeeperd or hal_gatekeeper*.
      Bug: 34715716
      Change-Id: If87c865461580ff861e7e228a96d315d319e1765
      6fe344e3
    • Steven Moreland's avatar
      property: add persist.hal.binderization · cd597cd5
      Steven Moreland authored
      - Added set_prop to shell so that you can set it from shell.
      - Added set_prop to sytem_app so that it can be updated in settings.
      
      Bug: 34256441
      Test: can update prop from Settings and shell. nfc and lights work with
      ag/1833821 with persist.hal.binderization set to on and off. There are
      no additional selinux denials.
      Change-Id: I883ca489093c1d56b2efa725c58e6e3f3b81c3aa
      cd597cd5
    • William Roberts's avatar
      te_macros: introduce add_service() macro · 606d2fd6
      William Roberts authored
      
      Introduce the add_service() macro which wraps up add/find
      permissions for the source domain with a neverallow preventing
      others from adding it. Only a particular domain should
      add a particular service.
      
      Use the add_service() macro to automatically add a neverallow
      that prevents other domains from adding the service.
      
      mediadrmserver was adding services labeled mediaserver_service.
      Drop the add permission as it should just need the find
      permission.
      
      Additionally, the macro adds the { add find } permission which
      causes some existing neverallow's to assert. Adjust those
      neverallow's so "self" can always find.
      
      Test: compile and run on hikey and emulator. No new denials were
      found, and all services, where applicable, seem to be running OK.
      
      Change-Id: Ibbd2a5304edd5f8b877bc86852b0694732be993c
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      606d2fd6
    • Alex Klyubin's avatar
      41065072
    • Treehugger Robot's avatar
      Merge "Modular DRM for MediaPlayer" · 41185161
      Treehugger Robot authored
      41185161
  6. Jan 25, 2017
    • Alex Klyubin's avatar
      Remove hal_drm from mediadrmserver domain · 5bfda51e
      Alex Klyubin authored
      HAL clients should not be annotated with hal_x and haldomain. This may
      grant them too much access. Instead, the policy needed for using
      in-process HALs should be directly embedded into the client's domain
      rules.
      
      This reverts the moving of rules out of mediadrmserver in commit
      c86f42b9.
      
      Test: YouTube videos play back, no mediadrmserver denials
      Bug: 34715716
      Bug: 32815560
      Change-Id: Ib57ef880bcc306c6e01f2c24c0f3a4298598eb9a
      5bfda51e
    • Hassan Shojania's avatar
      Modular DRM for MediaPlayer · 8101bad7
      Hassan Shojania authored
      Bug:    34559906
      Test:	Manual through the test app
      Change-Id: Ib69d4fe6b0e21f162f08cea061260c683e4b8c9b
      8101bad7
    • Jeff Tinker's avatar
      Add sepolicy for drm HALs · c86f42b9
      Jeff Tinker authored
      bug:32815560
      Change-Id: I494141b47fcd2e7e0cc02aa58d8df9a222060b3f
      c86f42b9
    • Treehugger Robot's avatar
      Merge "racoon: Add SIOCSIFNETMASK" · f65641e9
      Treehugger Robot authored
      f65641e9
    • Treehugger Robot's avatar
      727e543f
    • Nick Kralevich's avatar
      racoon: Add SIOCSIFNETMASK · a675ca60
      Nick Kralevich authored
      XAUTH based VPNs
      1. IPSec XAUTH PSK
      2. IPSec XAUTH RSA
      fail with the following error from racoon
      
        01-24 16:46:05.583 18712 18712 W ip-up-vpn: type=1400 audit(0.0:390):
        avc: denied { ioctl } for path="socket:[954683]" dev="sockfs" ino=954683
        ioctlcmd=891c scontext=u:r:racoon:s0 tcontext=u:r:racoon:s0
        tclass=udp_socket permissive=0
      
      "setenforce 0" on the device fixed the issue.
      
      Bug: 34690009
      Test: Policy compiles
      Change-Id: Idc0d156ec32e7a9be3825c380c3cb0359fe4fabe
      a675ca60
    • Ray Essick's avatar
      rename mediaanalytics->mediametrics, wider access · 39185400
      Ray Essick authored
      reflect the change from "mediaanalytics" to "mediametrics"
      
      Also incorporates a broader access to the service -- e.g. anyone.
      This reflects that a number of metrics submissions come from application
      space and not only from our controlled, trusted media related processes.
      The metrics service (in another commit) checks on the source of any
      incoming metrics data and limits what is allowed from unprivileged
      clients.
      
      Bug: 34615027
      Test: clean build, service running and accessible
      Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
      39185400
    • Steven Moreland's avatar
      haldomain: search for passthrough hals · 18d7f8c1
      Steven Moreland authored
      Bug: 34366227
      Test: passthrough services successfully found
      Change-Id: If2cad09edc42f01cc5a444229758ecdfe2017cf2
      18d7f8c1
    • Calin Juravle's avatar
  7. Jan 24, 2017
Loading