Skip to content
Snippets Groups Projects
  1. Apr 02, 2017
  2. Apr 01, 2017
  3. Mar 31, 2017
  4. Mar 30, 2017
  5. Mar 29, 2017
    • Chad Brubaker's avatar
      Add media services to ephemeral_app · b93f0494
      Chad Brubaker authored
      Test: denials go away
      Change-Id: I103cf3ad8d86b461bcba8edce02f6202fd2bcbe8
      b93f0494
    • Sandeep Patil's avatar
      Merge changes from topic 'sefiles_relabel' into oc-dev · 394539c5
      Sandeep Patil authored
      * changes:
        mac_permissions: explicitly label all mac_permissions files
        sepolicy: explicitly label all sepolicy files
        seapp_context: explicitly label all seapp context files
        file_context: explicitly label all file context files
        service_contexts: label service_contexts explicitly
        prop_context: correctly label all property_context files
      394539c5
    • Alex Klyubin's avatar
      Further restrict access to Binder services from vendor · 5c09d123
      Alex Klyubin authored
      This tightens neverallows for looking up Binder servicemanager
      services from vendor components. In particular, vendor components,
      other than apps, are not permitted to look up any Binder services.
      Vendor apps are permitted to look up only stable public API services
      which is exactly what non-vendor apps are permitted to use as well.
      If we permitted vendor apps to use non-stable/hidden Binder services,
      they might break when core components get updated without updating
      vendor components.
      
      Test: mmm system/sepolicy
      Bug: 35870313
      Change-Id: I949d62b3528cadb4bfe6f5985c25d1f497df0d5a
      5c09d123
    • Alex Klyubin's avatar
    • TreeHugger Robot's avatar
      d46d3a6c
    • Alex Klyubin's avatar
      tee domain is a vendor domain · 0f6c047d
      Alex Klyubin authored
      As a result, Keymaster and DRM HALs are permitted to talk to tee domain
      over sockets. Unfortunately, the tee domain needs to remain on the
      exemptions list because drmserver, mediaserver, and surfaceflinger are
      currently permitted to talk to this domain over sockets.
      
      We need to figure out why global policy even defines a TEE domain...
      
      Test: mmm system/sepolicy
      Bug: 36601092
      Bug: 36601602
      Bug: 36714625
      Bug: 36715266
      Change-Id: I0b95e23361204bd046ae5ad22f9f953c810c1895
      0f6c047d
    • Alex Klyubin's avatar
      Loosen system app data neverallows · f2e07765
      Alex Klyubin authored
      We don't want to prevent access from vendor platform apps to system app
      data. The issue with the referencing system_app explicitly in
      neverallows is that vendor platform apps which need sandboxes similar to
      system_app cannot be placed under system_app without modifying the
      policy for all platform apps.
      
      Test: mmm system/sepolicy
      Change-Id: Ic0052602c31be4d74b02eeea129e2d8bfbd9c8d3
      f2e07765
    • Andy Hung's avatar
      Allow MediaExtractor to create FileSource · 1c98fbf8
      Andy Hung authored
      W Binder:538_2: type=1400 audit(0.0:9): avc: denied { getattr } for path="/data/media/0/Qtc88.mp4" dev="dm-0" ino=678654 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=0
      
      W generic : type=1400 audit(0.0:9): avc: denied { read } for path="/data/media/0/Qtc88.mp4" dev="dm-0" ino=678654 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=0
      
      Test: Photos, Play Music, Play Movies, Youtube
      Bug: 29125703
      Change-Id: If84ab43b934944abf4c416db751ab6694835df83
      1c98fbf8
    • Sandeep Patil's avatar
      mac_permissions: explicitly label all mac_permissions files · bb24f3ab
      Sandeep Patil authored
      
      *mac_permissions.xml files need to be explicitly labeled as they are now split
      cross system and vendor and won't have the generic world readable
      'system_file' or 'rootfs' label.
      
      Bug: 36003167
      Test: no new 'mac_perms_file' denials at boot complete on sailfish
      Test: successfully booted into recovery without denials and sideloaded
            OTA update.
      Test: Launch 'chrome' and succesfully load a website.
      Test: Launch Camera and take a picture.
      Test: Launch Camera and record a video, succesfully playback recorded
            video
      
      Change-Id: I1c882872bb78d1242ba273756ef0dc27487f58fc
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      bb24f3ab
    • Sandeep Patil's avatar
      sepolicy: explicitly label all sepolicy files · 136caa1b
      Sandeep Patil authored
      
      sepolicy files need to be explicitly labeled as they are now split
      cross system and vendor and won't have the generic world readable
      'system_file' or 'rootfs' label.
      
      Bug: 36527360
      Test: no new 'sepolicy_file' denials at boot complete on sailfish
      Test: successfully booted into recovery without denials and sideloaded
            OTA update.
      Test: Launch 'chrome' and succesfully load a website.
      Test: Launch Camera and take a picture.
      Test: Launch Camera and record a video, succesfully playback recorded
            video
      
      Change-Id: I6fe8ba31588c2d75521c6e2b0bf7e6d6eaf80a19
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      136caa1b
    • Sandeep Patil's avatar
      seapp_context: explicitly label all seapp context files · 1e149967
      Sandeep Patil authored
      
      seapp_context files need to be explicitly labeled as they are now split
      cross system and vendor and won't have the generic world readable
      'system_file' label.
      
      Bug: 36002414
      Test: no new 'seapp_context' denials at boot complete on sailfish
      Test: successfully booted into recovery without denials and sideloaded
            OTA update.
      Test: ./cts-tradefed run singleCommand cts --skip-device-info \
            --skip-preconditions --skip-connectivity-check --abi \
            arm64-v8a --module CtsSecurityHostTestCases -t \
            android.security.cts.SELinuxHostTest#testAospSeappContexts
      Test: Launch 'chrome' and succesfully load a website.
      Test: Launch Camera and take a picture.
      Test: Launch Camera and record a video, succesfully playback recorded
            video
      
      Change-Id: I19b3e50c6a7c292713d3e56ef0448acf6e4270f7
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      1e149967
    • Sandeep Patil's avatar
      file_context: explicitly label all file context files · c9cf7361
      Sandeep Patil authored
      
      file_context files need to be explicitly labeled as they are now split
      across system and vendor and won't have the generic world readable
      'system_file' label.
      
      Bug: 36002414
      Test: no new 'file_context' denials at boot complete on sailfish
      Test: successfully booted into recovery without denials and sideloaded
      OTA update.
      Test: ./cts-tradefed run singleCommand cts --skip-device-info \
             --skip-preconditions --skip-connectivity-check --abi \
             arm64-v8a --module CtsSecurityHostTestCases -t \
             android.security.cts.SELinuxHostTest#testAospFileContexts
      
      Change-Id: I603157e9fa7d1de3679d41e343de397631666273
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      c9cf7361
Loading