- Mar 31, 2017
-
-
Jeff Vander Stoep authored
Vendor and system components are only allowed to share files by passing open FDs over HIDL. Ban all directory access and all file accesses other than what can be applied to an open FD such as ioctl/stat/read/write/append. This commit asserts that core components marked with attribute coredomain may only access core data types marked with attribute core_data_file_type. A temporary exemption is granted to domains that currently rely on access. Bug: 34980020 Test: build Marlin policy Change-Id: I2f0442f2628fbac1f2f7aa5ddf2a13e16b2546cc
-
- Mar 30, 2017
-
-
Mathias Agopian authored
am: 1eb656f0 Change-Id: I88aa508e35a59924715acb6d77e37344e41b55fe
-
Mathias Agopian authored
am: ea0a3027 Change-Id: I20ec1ec4f217d3c6622f5bc263c268ba343bf493
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: e777112e Change-Id: I893aff73fa2beb83bee0e17aec849ac49d03c639
-
Jeff Vander Stoep authored
am: f4739f40 Change-Id: Ie07e3ababe6836f6b5c2522c3a3255367d01b662
-
TreeHugger Robot authored
-
Alex Klyubin authored
am: ff61a10c Change-Id: Ie0c415ee9e79628f0048ff30d0daffbd89420f74
-
Alex Klyubin authored
am: b5081ea0 Change-Id: I3decd5c29ee797486d563393212cfc09666b77e1
-
TreeHugger Robot authored
-
Mathias Agopian authored
the list to update was determined by looking at who currently has access to surfaceflinger for ipc and FD use. Test: try some media stuff Bug: 36333314 Change-Id: I474d0c44f8cb3868aad7a64e5a3640cf212d264d
-
Myles Watson authored
am: 8f288f56 Change-Id: Ic1ff068363790a030eb15776fda5b32704b9a465
-
Jeff Vander Stoep authored
Runas/libselinux needs access to seapp_contexts_file to determine transitions into app domains. Addresses: avc: denied { read } for pid=7154 comm="run-as" name="plat_seapp_contexts" dev="rootfs" ino=9827 scontext=u:r:runas:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file Bug: 36782586 Test: Marlin policy builds Change-Id: I0f0e937e56721d458e250d48ce62f80e3694900f
-
Myles Watson authored
am: a21b3b19 Change-Id: I3e0bb56e66f2e4dc2ac04288e96c79070a710490
-
Myles Watson authored
am: 6f700ae5 Change-Id: I6d58dcfa6037dc916d9ab5b995d2132e559783e1
-
Myles Watson authored
am: 02d9d21d Change-Id: I29861f9cc52001f2968c2313f48031dd01afe8c7
-
Myles Watson authored
am: 52ae8351 Change-Id: I7a84acb504ffb803e3e782d0c5b2d4daf7565e8f
-
Myles Watson authored
am: ef2057a6 Change-Id: I1c706c034571de2470fdb4458ab7c1ea43e4f52e
-
Alex Klyubin authored
This tightens neverallows for looking up Binder servicemanager services from vendor components. In particular, vendor components, other than apps, are not permitted to look up any Binder services. Vendor apps are permitted to look up only stable public API services which is exactly what non-vendor apps are permitted to use as well. If we permitted vendor apps to use non-stable/hidden Binder services, they might break when core components get updated without updating vendor components. Test: mmm system/sepolicy Bug: 35870313 Change-Id: I47d40d5d42cf4205d9e4e5e5f9d0794104efc28f
-
TreeHugger Robot authored
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66 Merged-In: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Andy Hung authored
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Jiyong Park authored
am: cc5da52f Change-Id: Ie05d021efd289bf14f86ac070fce74c81ac7bd57
-
Jiyong Park authored
am: 36c8f160 Change-Id: I4c39b013d9d8f296171dde6d0b0b3400074f3825
-
TreeHugger Robot authored
-
Ian Pedowitz authored
am: 134c7182 Change-Id: I23e7aa2a87f34a4adc5fd5eac85710db6238d9db
-
Ian Pedowitz authored
am: d7a2f60d Change-Id: Ifc66292d55f1daea28069cbf63cd70bf96fee74d
-
Ian Pedowitz authored
-
Ian Pedowitz authored
This reverts commit 5c09d123. Broke the build Bug: 35870313 Test: source build/envsetup.sh && lunch marlin-userdebug && m -j40 Change-Id: I71c968be6e89462fd286be5663933552d478f8bf
-
Alex Klyubin authored
am: 3100873f Change-Id: Icc445d11ccc9606717d07317446c43a2ef731447
-
Alex Klyubin authored
am: c673770a Change-Id: Icb5276a3b73419b4b0e3a9fea1af157d0e1ef882
-
TreeHugger Robot authored
-
Jiyong Park authored
Full treble targets cannot have sockets between framework and vendor processes. In theory, this should not affect aosp_arm64_ab where only framework binaries are built. However, /system/sepolicy has rild.te which is now vendor binary and this causes neverallow conflict when building aosp_arm64_ab. So, we just temporarily annotate the rild with socket_between_core_and_vendor_violators so that the neverallow conflict can be avoided. Test: choosecombo 1 aosp_arm64_ab userdebug; m -j 80 The build should not break. Change-Id: I260757cde96857cc3f539d5f82ca69c50653f8c7
-
Chad Brubaker authored
am: 897473dc Change-Id: Ic481a4198f03ee242d04cfa11d885353b24cde4c
-
Nathan Harold authored
am: a6dc0dc2 Change-Id: I0ac39078f058e970822deda9a3161c05b0dceaeb
-
Nathan Harold authored
am: d80511d3 Change-Id: I329798f6f7885aa68323367a43da6c0a3daa3fb5
-