- Mar 30, 2017
-
-
Mathias Agopian authored
the list to update was determined by looking at who currently has access to surfaceflinger for ipc and FD use. Test: try some media stuff Bug: 36333314 Change-Id: I474d0c44f8cb3868aad7a64e5a3640cf212d264d
-
- Mar 29, 2017
-
-
Alex Klyubin authored
-
TreeHugger Robot authored
-
Alex Klyubin authored
As a result, Keymaster and DRM HALs are permitted to talk to tee domain over sockets. Unfortunately, the tee domain needs to remain on the exemptions list because drmserver, mediaserver, and surfaceflinger are currently permitted to talk to this domain over sockets. We need to figure out why global policy even defines a TEE domain... Test: mmm system/sepolicy Bug: 36601092 Bug: 36601602 Bug: 36714625 Bug: 36715266 Change-Id: I0b95e23361204bd046ae5ad22f9f953c810c1895
-
Alex Klyubin authored
We don't want to prevent access from vendor platform apps to system app data. The issue with the referencing system_app explicitly in neverallows is that vendor platform apps which need sandboxes similar to system_app cannot be placed under system_app without modifying the policy for all platform apps. Test: mmm system/sepolicy Change-Id: Ic0052602c31be4d74b02eeea129e2d8bfbd9c8d3
-
Alex Klyubin authored
Unescaped apostrophe is not permitted inside macros. Test: mmm system/sepolicy -- no warnings Bug: 34980020 Change-Id: I893a41508d8b62975771967fd6e40e50d188c7c1
-
- Mar 28, 2017
-
-
Jeff Vander Stoep authored
Vendor and system components are only allowed to share files by passing open FDs over HIDL. Ban all directory access and all file accesses other than what can be applied to an open file: stat/read/write/append. This commit marks core data types as core_data_file_type and bans access to non-core domains with an exemption for apps. A temporary exemption is also granted to domains that currently rely on access with TODOs and bug number for each exemption. Bug: 34980020 Test: Build and boot Marlin. Make phone call, watch youtube video. No new denials observed. Change-Id: I320dd30f9f0a5bf2f9bb218776b4bccdb529b197
-
TreeHugger Robot authored
-
Treehugger Robot authored
-
TreeHugger Robot authored
-
- Mar 27, 2017
-
-
Alex Klyubin authored
In f5446eb1 I forgot to let violators of "no Binder in vendor" rule keep their access to /dev/binder. This commit fixes the issue. Test: mmm system/sepolicy Bug: 35870313 Bug: 36657020 Change-Id: I3fc68df1d78e2a2da94ac9bf036a51923e3a9aae
-
Kevin Schoedel authored
-
Jeff Vander Stoep authored
am: ab1fad17 Change-Id: I4c7ea7e2bd41950d5203660af7058895b83870ab
-
Jeff Vander Stoep authored
am: 2f4df755 Change-Id: I4a273520e7a5a92f5739f413d8773ddb3c6a259a
-
Jeff Vander Stoep authored
am: 915c0070 Change-Id: I6899ca877d1ccf0a3d475fd34cfffc00eacdf23d
-
Treehugger Robot authored
-
Steven Moreland authored
am: d34c7eef Change-Id: Ieb708734a6578e9f7bc43731e6b297704f8f3937
-
Steven Moreland authored
am: aa5feec9 Change-Id: I3ba818c67e9134161dfd9c74d9fdb52f0bd51bef
-
Steven Moreland authored
am: 5a9410cf Change-Id: I4cf02d403a045bce6da96939406a886197f5a1a5
-
Treehugger Robot authored
-
Alex Klyubin authored
On PRODUCT_FULL_TREBLE devices, non-vendor domains (coredomain) and vendor domain are not permitted to connect to each other's sockets. There are two main exceptions: (1) apps are permitted to talk to other apps over Unix domain sockets (this is public API in Android framework), and (2) domains with network access (netdomain) are permitted to connect to netd. This commit thus: * adds neverallow rules restricting socket connection establishment, * temporarily exempts the domains which are currently violating this rule from this restriction. These domains are grouped using the new "socket_between_core_and_vendor_violators" attribute. The attribute is needed because the types corresponding to violators are not exposed to the public policy where the neverallow rules are. Test: mmm system/sepolicy Bug: 36613996 Change-Id: I458f5a09a964b06ad2bddb52538ec3a15758b003
-
- Mar 26, 2017
-
-
Jeff Sharkey authored
am: a4960ef9 Change-Id: Ia6fbb2aae4d5c66e868e43b279748a7a96ae3bf7
-
Jeff Sharkey authored
am: 92229884 Change-Id: Idd03a8f1a6b3a315ee6be221ea7d91b06be9477e
-
Jeff Sharkey authored
am: 3f724c95 Change-Id: Ia390c3537b7efe897154380ee836dbb7ac0ed742
-
Jeff Sharkey authored
This is a special file that can be mounted as a loopback device to exercise adoptable storage code on devices that don't have valid physical media. For example, they may only support storage media through a USB OTG port that is being used for an adb connection. avc: denied { read } for path="/data/misc/vold/virtual_disk" dev="sda35" ino=508695 scontext=u:r:kernel:s0 tcontext=u:object_r:vold_data_file:s0 tclass=file permissive=0 Bug: 34903607 Change-Id: I84721ec0e9495189a7d850461875df1839826212
-
Jeff Vander Stoep authored
Moves selinux policy build decisions to system/sepolicy/Android.mk. This is done because the PRODUCT_FULL_TREBLE variable isn't available in embedded.mk and TARGET_SANITIZE isn't available to dependencies of init. Test: Build/boot Bullhead PRODUCT_FULL_TREBLE=false Test: Build/boot Marlin PRODUCT_FULL_TREBLE=true Test: Build Marlin TARGET_SANITIZE=address. Verify asan rules are included in policy output. Bug: 36138508 Change-Id: I20a25ffdfbe2b28e7e0f3e090a4df321e85e1235
-
Jeff Sharkey authored
am: d33a51c3 Change-Id: Ife99cd6fc85b77ea77ca1edc9a8c741ee0d204ee
-
Jeff Sharkey authored
am: a6152592 Change-Id: I7f1ad41abd96abaef416d4cb3352fa475cffff5d
-
Jeff Sharkey authored
am: 2224f30a Change-Id: I184272269fed360807e41a1cac1fe099477685e6
-
Jeff Sharkey authored
-
Steven Moreland authored
am: 518e14e6 Change-Id: I2b9c58cf3e7f583d8a099545696f06e741e7d2b2
-
Steven Moreland authored
am: 5ebf1975 Change-Id: I1033e791b718bd1c374885f3a16b176994bb957f
-
Steven Moreland authored
am: 133d5298 Change-Id: I934f58768bd30de9c62d33e83b6a1b60f0d0fb9b
-
Treehugger Robot authored
-
Jeff Sharkey authored
Per loop(4), this device is the preferred way of allocating new loop devices since Linux 3.1. avc: denied { read write } for name="loop-control" dev="tmpfs" ino=15221 scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 Bug: 34903607 Change-Id: I1f5f62cf0a1c24c6f6453100004812af4b8e1503
-
William Roberts authored
am: 45353737 Change-Id: Ifbd0f8bc238fe7ec49299b20dec36b0a07a580df
-
William Roberts authored
am: 72bdc353 Change-Id: I461829999d3413254a837ffb4612316d9d992acd
-