Skip to content
Snippets Groups Projects
  1. Mar 26, 2017
  2. Mar 25, 2017
  3. Mar 24, 2017
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 5d8fcf3b
      Alex Klyubin authored
      am: 73a6f38b
      
      Change-Id: I24d9be712209ee22a33ae858001c4e38e0eb763a
      5d8fcf3b
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 73a6f38b
      Alex Klyubin authored
      73a6f38b
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · e1742ef0
      Alex Klyubin authored
      am: 6b558dcb
      
      Change-Id: I82c412038e43bb343dc355c9d1e56a11f6da6542
      e1742ef0
    • Alex Klyubin's avatar
      Mark all clients of Allocator HAL · 7cda44f4
      Alex Klyubin authored
      This change associates all domains which are clients of Allocator HAL
      with hal_allocator_client and the, required for all HAL client
      domains, halclientdomain.
      
      This enables this commit to remove the now unnecessary hwallocator_use
      macro because its binder_call(..., hal_allocator_server) is covered by
      binder_call(hal_allocator_client, hal_allocator_server) added in this
      commit.
      
      Unfortunately apps, except isolated app, are clients of Allocator HAL
      as well. This makes it hard to use the hal_client_domain(...,
      hal_allocator) macro because it translates into "typeattribute" which
      currently does not support being provided with a set of types, such as
      { appdomain -isolated_app }. As a workaround, hopefully until
      typeattribute is improved, this commit expresses the necessary
      association operation in CIL. private/technical_debt.cil introduced by
      this commit is appended into the platform policy CIL file, thus
      ensuring that the hack has effect on the final monolithic policy.
      
      P. S. This change also removes Allocator HAL access from isolated_app.
      Isolated app shouldn't have access to this HAL anyway.
      
      Test: Google Play Music plays back radios
      Test: Google Camera records video with sound and that video is then
            successfully played back with sound
      Test: YouTube app plays back clips with sound
      Test: YouTube in Chrome plays back clips with sound
      Bug: 34170079
      Change-Id: Id00bba6fde83e7cf04fb58bc1c353c2f66333f92
      7cda44f4
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · 6b558dcb
      Alex Klyubin authored
      This is a follow-up to f5446eb1 where
      I forgot to associate su and perfprofd domains with coredomain.
      
      Test: mmm system/sepolicy
            sepolicy-analyze $OUT/root/sepolicy attribute coredomain
      Bug: 35870313
      Change-Id: I13f90693843f7c6fe9fea8e5332aa6dd9558478a
      6b558dcb
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · 2fe065d7
      Alex Klyubin authored
      am: f5446eb1
      
      Change-Id: I23d5d274ae05a9b0bdac6872be86c3f56aec734e
      2fe065d7
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · f5446eb1
      Alex Klyubin authored
      On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
      apps) are not permitted to use Binder. This commit thus:
      * groups non-vendor domains using the new "coredomain" attribute,
      * adds neverallow rules restricting Binder use to coredomain and
        appdomain only, and
      * temporarily exempts the domains which are currently violating this
        rule from this restriction. These domains are grouped using the new
        "binder_in_vendor_violators" attribute. The attribute is needed
        because the types corresponding to violators are not exposed to the
        public policy where the neverallow rules are.
      
      Test: mmm system/sepolicy
      Test: Device boots, no new denials
      Test: In Chrome, navigate to ip6.me, play a YouTube video
      Test: YouTube: play a video
      Test: Netflix: play a movie
      Test: Google Camera: take a photo, take an HDR+ photo, record video with
            sound, record slow motion video with sound. Confirm videos play
            back fine and with sound.
      Bug: 35870313
      Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
      f5446eb1
    • Alex Klyubin's avatar
      Merge "Remove unnecessary rules from NFC HAL clients" · 3d12305d
      Alex Klyubin authored
      am: 93f99cb1
      
      Change-Id: I877e23910bc424a2026bab1d9669bc6537ea5c31
      3d12305d
    • Treehugger Robot's avatar
  4. Mar 23, 2017
  5. Mar 22, 2017
    • Alex Klyubin's avatar
      Remove unnecessary rules from NFC HAL clients · e5395706
      Alex Klyubin authored
      Rules in clients of NFC HAL due to the HAL running (or previously
      running) in passthrough mode are now targeting hal_nfc. Domains which
      are clients of NFC HAL are associated with hal_nfc only the the HAL
      runs in passthrough mode. NFC HAL server domains are always associated
      with hal_nfc and thus get these rules unconditionally.
      
      This commit also moves the policy of nfc domain to private. The only
      thing remaining in the public policy is the existence of this domain.
      This is needed because there are references to this domain in public
      and vendor policy.
      
      Test: Open a URL in Chrome, NFC-tap Android to another Android and
            observe that the same URL is opened in a web browser on the
            destination device. Do the same reversing the roles of the two
            Androids.
      Test: Install an NFC reader app, tap a passive NFC tag with the
            Android and observe that the app is displaying information about
            the tag.
      Test: No SELinux denials to do with NFC before and during and after
            the above tests on sailfish, bullhead, and angler.
      Bug: 34170079
      
      Change-Id: I29fe43f63d64b286c28eb19a3a9fe4f630612226
      e5395706
    • Jeff Vander Stoep's avatar
      Merge "Grant additional permissions for ASAN builds" · 1c05f800
      Jeff Vander Stoep authored
      am: 63211f8d
      
      Change-Id: If8aa9152a643522fc896b7a412d3fafb19043649
      1c05f800
    • Treehugger Robot's avatar
    • Sandeep Patil's avatar
      Merge "dumpstate: allow HALs to read /proc/interrupts" · e2f8626e
      Sandeep Patil authored
      am: 871e44c4
      
      Change-Id: I1c261dc247b93306c6d1a70dd0014532c84843c5
      e2f8626e
    • Treehugger Robot's avatar
    • Steven Moreland's avatar
      Merge "hwservicemanager: halserverdomain" · 3d49330b
      Steven Moreland authored
      am: 6456542f
      
      Change-Id: I353c8d695a5c995f72fe865f27682a05011f8f55
      3d49330b
    • Treehugger Robot's avatar
      6456542f
    • Jeff Vander Stoep's avatar
      Grant additional permissions for ASAN builds · 74434848
      Jeff Vander Stoep authored
      ASAN builds may require additional permissions to launch processes
      with ASAN wrappers. In this case, system_server needs permission to
      execute /system/bin/sh.
      
      Create with_asan() macro which can be used exclusively on debug
      builds. Note this means that ASAN builds with these additional
      permission will not pass the security portion of CTS - like any
      other debug build.
      
      Addresses:
      avc: denied { execute } for name="sh" dev="dm-0" ino=571
      scontext=u:r:system_server:s0 tcontext=u:object_r:shell_exec:s0
      tclass=file
      
      Test: lunch aosp_marlin-userdebug;
            cd system/sepolicy; mm SANITIZE_TARGET=address;
            Verify permissions granted using with_asan() are granted.
      Test: lunch aosp_marlin-userdebug;
            cd system/sepolicy; mm;
            Verify permissions granted using with_asan() are not granted.
      Test: lunch aosp_marlin-user;
            cd system/sepolicy; mm SANITIZE_TARGET=address;
            Verify permissions granted using with_asan() are not granted.
      Bug: 36138508
      Change-Id: I6e39ada4bacd71687a593023f16b45bc16cd7ef8
      74434848
    • Sandeep Patil's avatar
      dumpstate: allow HALs to read /proc/interrupts · a866a416
      Sandeep Patil authored
      
      /proc/interrupts may be dumped by dumpstate HAL if required.
      
      Bug: 36486169
      Test: 'adb shell bugreport' on sailfish
      
      Change-Id: Ifc41a516aeea846bc56b86b064bda555b43c58ed
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      a866a416
    • Roshan Pius's avatar
      Merge "wpa_supplicant: Remove unnecessary permissions from system_server" · 79005214
      Roshan Pius authored
      am: e1a350a0
      
      Change-Id: Ib2f28bdd5aa8dc1a6641f3f114965ac3ddec17e2
      79005214
Loading