Skip to content
Snippets Groups Projects
  1. Jan 18, 2017
  2. Jan 17, 2017
    • Alex Klyubin's avatar
      Group all HAL impls using haldomain attribute · f41d89eb
      Alex Klyubin authored
      This marks all HAL domain implementations with the haldomain attribute
      so that rules can be written which apply to all HAL implementations.
      
      This follows the pattern used for appdomain, netdomain and
      bluetoothdomain.
      
      Test: No change to policy according to sesearch.
      Bug: 34180936
      Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
      f41d89eb
    • Mikhail Naganov's avatar
      hal_audio: In binderized mode hal_audio needs access to IAllocator · ddb52d82
      Mikhail Naganov authored
      This is to ensure that hal_audio can access memory shared by
      audioserver.
      
      Bug: 34261005
      Change-Id: I84103b0d4692fd10afc56846fb116fec6a7b3dc7
      ddb52d82
  3. Jan 14, 2017
  4. Jan 13, 2017
    • Jim Miller's avatar
      New SeLinux policy for fingerprint HIDL · 54e0e5af
      Jim Miller authored
      Move from fingerprintd to new fingerprint_hal and update SeLinux policy.
      
      Test: Boot with no errors related to fingerprint sepolicy
      Bug: 33199080
      Change-Id: Idfde0cb0530e75e705033042f64f3040f6df22d6
      54e0e5af
    • Hridya Valsaraju's avatar
      add selinux policy for GNSS hal · 953c4396
      Hridya Valsaraju authored
      The following are the avc denials that are addressed:
      
      avc: denied { call } for pid=889 comm="system_server"
      scontext=u:r:system_server:s0 tcontext=u:r:hal_gnss_default:s0
      tclass=binder permissive=0
      
      avc: denied { call } for scontext=u:r:hal_gnss_default:s0
      tcontext=u:r:system_server:s0 tclass=binder permissive=0
      
      avc: denied { read } for name="hw" dev="mmcblk0p43" ino=1837
      scontext=u:r:hal_gnss_default:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      avc: denied { open } for path="/system/lib64/hw" dev="mmcblk0p43"
      ino=1837 scontext=u:r:hal_gnss_default:s0
      tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
      
      Bug:31974439
      
      Test: Checked that there no more related avc denial messages related to
      the GNSS HAL in dmesg.
      
      Change-Id: I5b43dc088017a5568dd8e442726d2bf52e95b1d5
      953c4396
    • Max Bires's avatar
      Auditing init and ueventd access to chr device files. · 9e7a5b0a
      Max Bires authored
      It seems likely that there is no reason to keep around a number of
      devices that are configured to be included into the pixel kernels. Init
      and ueventd should be the only processes with r/w access to these
      devices, so auditallow rules have been added to ensure that they aren't
      actually used.
      
      /dev/keychord was given its own type since it's one of the few character
      devices that's actually legitimately used and would cause log spam in
      the auditallow otherwise.
      
      Bug: 33347297
      Test: The phone boots without any apparent log spam.
      
      Change-Id: I3dd9557df8a9218b8c802e33ff549d15849216fb
      9e7a5b0a
  5. Jan 12, 2017
  6. Jan 11, 2017
  7. Jan 10, 2017
  8. Jan 09, 2017
    • Alex Klyubin's avatar
      Move ephemeral_app policy to private · baeac1fd
      Alex Klyubin authored
      This leaves only the existence of ephemeral_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private. There are a few rules, defined by other domains'
      files remaining in the public policy until the rules from these
      domains also move to the private policy:
      
      allow ephemeral_app_current appdomain:binder transfer;
      allow ephemeral_app_current audioserver_current:binder transfer;
      allow ephemeral_app_current drmserver_current:binder transfer;
      allow ephemeral_app_current dumpstate_current:binder transfer;
      allow ephemeral_app_current mediaserver_current:binder transfer;
      allow ephemeral_app_current surfaceflinger_current:binder transfer;
      allow ephemeral_app_current system_server_current:binder transfer;
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from platform_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: I98687181434a98a141469ef676c461fcd1db2d4e
      baeac1fd
    • Alex Klyubin's avatar
      Move platform_app policy to private · c42d134e
      Alex Klyubin authored
      This leaves only the existence of platform_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from platform_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: I47bb59fdfc07878c91fd5e207735cd0c07a128da
      c42d134e
    • Treehugger Robot's avatar
    • Treehugger Robot's avatar
    • Dan Cashman's avatar
      Split seapp_contexts into plat and nonplat components. · 9c038072
      Dan Cashman authored
      Bug: 33746381
      Test: Device boots with no extra denials.
      Change-Id: I2f0da92367851142e0d7df4afec8861ceaed9d3e
      9c038072
    • Nick Kralevich's avatar
      install_recovery.te: remove domain_deprecated · 0c8101b2
      Nick Kralevich authored
      No relevant collected denials.
      
      Test: device boots and no obvious problems.
      Test: no collected denials.
      Bug: 28760354
      Change-Id: Idcf939b3cbdb1dec835d59150181047d062e6c48
      0c8101b2
  9. Jan 08, 2017
  10. Jan 07, 2017
  11. Jan 06, 2017
Loading