- Mar 31, 2017
-
-
Alex Klyubin authored
This futher restricts neverallows for sockets which may be exposed as filesystem nodes. This is achieved by labelling all such sockets created by core/non-vendor domains using the new coredomain_socket attribute, and then adding neverallow rules targeting that attribute. This has now effect on what domains are permitted to do. This only changes neverallow rules. Test: mmm system/sepolicy Bug: 36577153 Change-Id: I633163cf67d60677c4725b754e01097dd5790aed
-
- Mar 30, 2017
-
-
Mathias Agopian authored
am: 1eb656f0 Change-Id: I88aa508e35a59924715acb6d77e37344e41b55fe
-
Mathias Agopian authored
am: ea0a3027 Change-Id: I20ec1ec4f217d3c6622f5bc263c268ba343bf493
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: e777112e Change-Id: I893aff73fa2beb83bee0e17aec849ac49d03c639
-
Jeff Vander Stoep authored
am: f4739f40 Change-Id: Ie07e3ababe6836f6b5c2522c3a3255367d01b662
-
TreeHugger Robot authored
-
Alex Klyubin authored
am: ff61a10c Change-Id: Ie0c415ee9e79628f0048ff30d0daffbd89420f74
-
Alex Klyubin authored
am: b5081ea0 Change-Id: I3decd5c29ee797486d563393212cfc09666b77e1
-
TreeHugger Robot authored
-
Mathias Agopian authored
the list to update was determined by looking at who currently has access to surfaceflinger for ipc and FD use. Test: try some media stuff Bug: 36333314 Change-Id: I474d0c44f8cb3868aad7a64e5a3640cf212d264d
-
Myles Watson authored
am: 8f288f56 Change-Id: Ic1ff068363790a030eb15776fda5b32704b9a465
-
Jeff Vander Stoep authored
Runas/libselinux needs access to seapp_contexts_file to determine transitions into app domains. Addresses: avc: denied { read } for pid=7154 comm="run-as" name="plat_seapp_contexts" dev="rootfs" ino=9827 scontext=u:r:runas:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file Bug: 36782586 Test: Marlin policy builds Change-Id: I0f0e937e56721d458e250d48ce62f80e3694900f
-
Myles Watson authored
am: a21b3b19 Change-Id: I3e0bb56e66f2e4dc2ac04288e96c79070a710490
-
Myles Watson authored
am: 6f700ae5 Change-Id: I6d58dcfa6037dc916d9ab5b995d2132e559783e1
-
Myles Watson authored
am: 02d9d21d Change-Id: I29861f9cc52001f2968c2313f48031dd01afe8c7
-
Myles Watson authored
am: 52ae8351 Change-Id: I7a84acb504ffb803e3e782d0c5b2d4daf7565e8f
-
Myles Watson authored
am: ef2057a6 Change-Id: I1c706c034571de2470fdb4458ab7c1ea43e4f52e
-
Alex Klyubin authored
This tightens neverallows for looking up Binder servicemanager services from vendor components. In particular, vendor components, other than apps, are not permitted to look up any Binder services. Vendor apps are permitted to look up only stable public API services which is exactly what non-vendor apps are permitted to use as well. If we permitted vendor apps to use non-stable/hidden Binder services, they might break when core components get updated without updating vendor components. Test: mmm system/sepolicy Bug: 35870313 Change-Id: I47d40d5d42cf4205d9e4e5e5f9d0794104efc28f
-
TreeHugger Robot authored
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66 Merged-In: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Andy Hung authored
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Myles Watson authored
Devices that store their BT MAC address in /data/misc/bluedroid/ need to find another place for that file. Bug: 36602160 Test: Restart Bluetooth, check for selinux denials/files in /data/misc Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66
-
Jiyong Park authored
am: cc5da52f Change-Id: Ie05d021efd289bf14f86ac070fce74c81ac7bd57
-
Jiyong Park authored
am: 36c8f160 Change-Id: I4c39b013d9d8f296171dde6d0b0b3400074f3825
-
TreeHugger Robot authored
-
Ian Pedowitz authored
am: 134c7182 Change-Id: I23e7aa2a87f34a4adc5fd5eac85710db6238d9db
-
Ian Pedowitz authored
am: d7a2f60d Change-Id: Ifc66292d55f1daea28069cbf63cd70bf96fee74d
-
Ian Pedowitz authored
-
Ian Pedowitz authored
This reverts commit 5c09d123. Broke the build Bug: 35870313 Test: source build/envsetup.sh && lunch marlin-userdebug && m -j40 Change-Id: I71c968be6e89462fd286be5663933552d478f8bf
-
Alex Klyubin authored
am: 3100873f Change-Id: Icc445d11ccc9606717d07317446c43a2ef731447
-
Alex Klyubin authored
am: c673770a Change-Id: Icb5276a3b73419b4b0e3a9fea1af157d0e1ef882
-
TreeHugger Robot authored
-
Jiyong Park authored
Full treble targets cannot have sockets between framework and vendor processes. In theory, this should not affect aosp_arm64_ab where only framework binaries are built. However, /system/sepolicy has rild.te which is now vendor binary and this causes neverallow conflict when building aosp_arm64_ab. So, we just temporarily annotate the rild with socket_between_core_and_vendor_violators so that the neverallow conflict can be avoided. Test: choosecombo 1 aosp_arm64_ab userdebug; m -j 80 The build should not break. Change-Id: I260757cde96857cc3f539d5f82ca69c50653f8c7
-
Chad Brubaker authored
am: 897473dc Change-Id: Ic481a4198f03ee242d04cfa11d885353b24cde4c
-
Nathan Harold authored
am: a6dc0dc2 Change-Id: I0ac39078f058e970822deda9a3161c05b0dceaeb
-
Nathan Harold authored
am: d80511d3 Change-Id: I329798f6f7885aa68323367a43da6c0a3daa3fb5
-