- Apr 16, 2017
-
-
Martijn Coenen authored
The new binder_call() lines had to be added because this change removes mediacodec from binderservicedomain (on full-treble), hence domains that could previously reach mediacodec with binder_call(domain, binderservicedomain) now need explicit calls instead. Test: Youtube, Netflix, Maps, Chrome, Music Change-Id: I3325ce20d9304bc07659fd435554cbcbacbc9829
-
Martijn Coenen authored
-
- Apr 15, 2017
-
-
TreeHugger Robot authored
-
Martijn Coenen authored
Test: WIP Change-Id: I678b0d0e9750b25628b86060574fd516d3749cdf
-
Sandeep Patil authored
Bug: 36463595 Test: Boot sailfish, make wifi call, internet over data and wifi Change-Id: I81259b6412d7197725afe2fe4976aa0a03b8df6e Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Jeff Vander Stoep authored
Attributes added to the policy by the policy compiler are causing performance issues. Telling the compiler to expand these auto-generated attributes to their underlying types prevents preemtion during policy lookup. Bug: 3650825 Test: Build and boot Bullhead Change-Id: I9a33f5efb1e7c25d83dda1ea5dfe663b22846a2f
-
- Apr 14, 2017
-
-
Martijn Coenen authored
Since hal_graphics_composer_default is now no longer a member of binderservicedomain, these domains would no longer be able to use filedescriptors from it. Bug: 36569525 Bug: 35706331 Test: marlin boots, YouTube, Maps, Camera, video Change-Id: I4c110cf7530983470ae079e4fbc8cf11aa0fab7f
-
TreeHugger Robot authored
* changes: suppress audit logs from rild's access to core domain through system() sepolicy: auditallow vendor components to execute files from /system vendor_shell: add sepolicy for vendor shell toolbox: add sepolicy for vendor toybox Do not allow priv_apps to scan all exec files
-
TreeHugger Robot authored
-
Iliyan Malchev authored
This change disables /dev/binder access to and by mediacodec on full-Treble devices. b/36604251 OMX HAL (aka mediacodec) uses Binder and even exposes a Binder service Test: marlin Change-Id: I1e30a6c56950728f36351c41b2859221753fd91a Signed-off-by:
Iliyan Malchev <malchev@google.com>
-
Alex Klyubin authored
Test: mmm system/sepolicy Bug: 34980020 (cherry picked from commit 3cc6a959) Change-Id: I64c7275551e8e27d68072e8ec38c07b539989da0
-
Sandeep Patil authored
Change-Id: Ic9a9026df6f36d65fa02cc7b264bc901a14546f9 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Adds a rule to audit vendor domains from executing programs from /system with the exception of domains whitelisted in the rule. Bug: 36463595 Test: Boot sailfish Test: Run SELinuxHostTests with the tests that checks for new violators (without the API check) to ensure it fails for sailfish. The API check will allow the test to skip the check. Change-Id: Id19f32141bceba4db4bd939394ff3ee0b3c4b437 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Bug: 36463595 Test: Boot sailfish and make sure all vendor services that are shell scripts work. (Checke exited status) Change-Id: I3d1d564114a914dec8179fb93a9e94493c2808da Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Andrew Scull authored
-
Sandeep Patil authored
Bug: 36987889 Test: Build Change-Id: I6dda2949069ccf14d3463bd7428494bde561ed9a Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
- Apr 13, 2017
-
-
Sandeep Patil authored
The vendor toybox MUST always be executed without transition and non-vendor processes are not allowed to execute the binary. Bug: 36463595 Test: Boot and test if system shell can run /vendor/bin/echo Result: requires 'su' Change-Id: Ifb9aa61f247f91fb870b99d60ac7f849ee9c6adc Signed-off-by:
Sandeep Patil <sspatil@google.com> (cherry picked from commit c112cd18e8999c0242a2560219033231a0e19898)
-
Sandeep Patil authored
Bug: 36463595 Test: sailfish boots without new denials Change-Id: I4271a293b91ab262dddd4d40220cd7daaff53bf2 Signed-off-by:
Sandeep Patil <sspatil@google.com> (cherry picked from commit b2586825e1ce92d637754b4c40e4d5edfd50a1a6)
-
Alex Klyubin authored
-
Alex Klyubin authored
This unbreaks user builds broken by recently landed changes to secilc which is now aggressively removing attributes which aren't used in allow rules, even when they are used in other places, such as being referenced from *_contexts files. User builds are broken by vndservice_manager_type not being found when checkfc is run for *vndservice_contexts targets. Test: On a clean user build: mmma system/sepolicy Bug: 37319524 Bug: 36508258 Change-Id: I4a1727a74122ecd9020c3831462d56a65ee6d304
-
TreeHugger Robot authored
-
Alex Klyubin authored
ag/2106481 negatively interfered with ag/2106263... Test: mmm system/sepolicy Bug: 34454312 Change-Id: If3f5ef6696341ccfdd706350ec670f8426dac9c9
-
Alex Klyubin authored
-
Martijn Coenen authored
-
Jeffrey Vander Stoep authored
-
Martijn Coenen authored
So it won't get compiled out of sepolicy. Test: marlin build Change-Id: I3a089fe83df69a76bebf64f874556967bc49ee78
-
TreeHugger Robot authored
-
Alex Klyubin authored
This adds restrictions on which domains can register this HwBinder service with hwservicemanager and which domains can obtain tokens for this service from hwservicemanager. Test: Use Google Camera app to take HDR+ photo, conventional photo, record video with sound, record slow motion video with sound. Check that the photos display correctly and that videos play back fine and with sound. Check that there are no SELinux denials to do with camera. Bug: 34454312 Change-Id: Icfaeed917423510d9f97d18b013775596883ff64
-
TreeHugger Robot authored
-
Martijn Coenen authored
-
Martijn Coenen authored
hwservicemanager can check hwservice_contexts files both from the framework and vendor partitions. Initially, have a wildcard '*' in hwservice_contexts that maps to a label that can be added/found from domain. This needs to be removed when the proper policy is in place. Also, grant su/shell access to hwservicemanager list operations, so tools like 'lshal' continue to work. Bug: 34454312 Test: Marlin boots Change-Id: I3a02d97a82458692b528d85c1b8e78b6f82ea1bc
-
Jin Qian authored
Test: trigger dumpsys storaged from GMScore Bug: 37284569 Change-Id: Ie734ce5487a69f8cc29dd73d470229fe81cd1176
-
Jeff Vander Stoep authored
Attributes added to the policy by the policy compiler are causing performance issues. Telling the compiler to expand these auto-generated attributes to their underlying types prevents preemtion during policy lookup. With this patch the number of attributes in policy drops from 845 to 475. The number of attributes assigned to the bluetooth domain drops from 41 to 11. Bug: 3650825 Test: Build and boot Marlin Change-Id: Ica06e82001eca323c435fe13c5cf4beba74999e2
-
- Apr 12, 2017
-
-
Alex Klyubin authored
All HALs which are represented by hal_* attributes in SELinux policy are required to run in binderized mode on Treble devices. This commit thus makes the SELinux policy for Treble devices no longer associate domains in hal_x_client with hal_x attribute, which is what was granting domains hosting clients of hal_x the rules needed to run this HAL in-process. The result is that core components have now less access. This commit has no effect on non-Treble devices. Test: Device boots -- no new denials Test: Play movie using Google Play Movies and Netflix Test: Play YouTube clip in YouTube app and in Chrome Test: Unlock lock screen using fingerprint Test: Using Google Camera, take a photo, an HDR+ photo, record a video with sound, a slow motion video with sound. Photos and videos display/play back fine (incl. sound). Test: adb screencap Test: $ monitor take screenshot Test: In all tests, no deials to do with hal_*, except pre-existing denials to do with hal_gnss. Bug: 37160141 Bug: 34274385 Bug: 34170079 Change-Id: I1ca91d43592b466114af13898f5909f41e59b521
-
Dan Cashman authored
commit 552fb537 fixed an undefined module error by removing the module when not defined (on non-treble devices), but the sepolicy build on non-treble devices was changed to rely on the split treble files, even though the split is not used. Change this so that the file is always present, to allow policy compilation. Test: policy fully builds. Change-Id: Ia0934c739336cea54228bbff8d6644aa3ae501e5
-
Dan Cashman authored
Specifying an empty module causes a build error, so make sure that if there is no $(platform_mapping_file) the MODULE is not included. Test: Makefiles parsed without error. Change-Id: Ie99e6534c388a3d42bf90cdfef5ee64d5c640fa0
-
Daniel Cashman authored
-
Daniel Cashman authored
-
Daniel Cashman authored
-
Phil Burk authored
-