Sohani Rao
3dd460ba2b
SE Policy for Wifi Offload HAL
...
Update SE Policy to allow calls to and callbacks from Wifi Offload HAL
HIDL binderized service.
Cherry pick from d56aa1982d15acfc2408271138dac43f1e5dc987
Bug: 32842314
Test: Unit tests, Mannual test to ensure Wifi can be brought up and
connected to an AP, ensure that Offload HAL service is running and that
that wificond can get the service handle by calling hwservicemanager.
Change-Id: I0fc51a4152f1891c8d88967e75d45ded115e766e
2017-04-04 14:28:39 -07:00
Steven Moreland
11468f373c
Merge "Remove hal_binderization_prop" am: 1871fc0a88
am: 2261cab6f2
am: 484a277c29
...
am: 7138973fe8
Change-Id: I19217d9c4f428223beef29605ab4fd4f0a0db4b7
2017-04-04 20:26:04 +00:00
Steven Moreland
7138973fe8
Merge "Remove hal_binderization_prop" am: 1871fc0a88
am: 2261cab6f2
...
am: 484a277c29
Change-Id: Iaa779c0d07bc503e27d0d9b65816347e819daa8a
2017-04-04 20:22:31 +00:00
Steven Moreland
484a277c29
Merge "Remove hal_binderization_prop" am: 1871fc0a88
...
am: 2261cab6f2
Change-Id: Id44a7c591e8d7640c89e74cb9e88ce7849439c29
2017-04-04 20:17:49 +00:00
Steven Moreland
2261cab6f2
Merge "Remove hal_binderization_prop"
...
am: 1871fc0a88
Change-Id: I2d474b6d04d0fa2af7ad35d7af068e38477609ee
2017-04-04 20:12:30 +00:00
Treehugger Robot
1871fc0a88
Merge "Remove hal_binderization_prop"
2017-04-04 19:49:52 +00:00
Alex Klyubin
5786f36b53
Merge "Move TEE rules to vendor image" into oc-dev am: fbccda3423
...
am: 4234d95f02
Change-Id: I5bf5e7a14936c275d78c1ae3438dcad88da33233
2017-04-04 19:21:29 +00:00
Alex Klyubin
4234d95f02
Merge "Move TEE rules to vendor image" into oc-dev
...
am: fbccda3423
Change-Id: I1dd3889756bcc6324f80d20aeecba95587e68f20
2017-04-04 19:10:59 +00:00
TreeHugger Robot
fbccda3423
Merge "Move TEE rules to vendor image" into oc-dev
2017-04-04 18:59:24 +00:00
Steven Moreland
d40474ec55
Remove hal_binderization_prop
...
Test: works on internal marlin
Bug: 34274385
Change-Id: Idd35e5cdccb595b4e5994eb1d78fdeece0aec0a6
2017-04-04 09:46:45 -07:00
Roshan Pius
a32386bbf3
Merge "sepolicy: Add new wifi keystore HAL" into oc-dev am: 29f273ce6a
...
am: a21b8b0e1f
Change-Id: I959ce59a098036326ebfc3244972519fd129f364
2017-04-04 16:26:04 +00:00
Roshan Pius
a21b8b0e1f
Merge "sepolicy: Add new wifi keystore HAL" into oc-dev
...
am: 29f273ce6a
Change-Id: I0dc5693bddd9574eb36ee4a711652b4130afdd8e
2017-04-04 16:22:05 +00:00
TreeHugger Robot
29f273ce6a
Merge "sepolicy: Add new wifi keystore HAL" into oc-dev
2017-04-04 16:12:48 +00:00
Martijn Coenen
f09591ef61
Merge "Add target for vndservice_contexts." into oc-dev am: c3a9e7df5f
...
am: f89f35ecc9
Change-Id: I34301b22c7ee6e041326f37ffd398245672fe926
2017-04-04 03:57:58 +00:00
Martijn Coenen
f89f35ecc9
Merge "Add target for vndservice_contexts." into oc-dev
...
am: c3a9e7df5f
Change-Id: Ifcb4f63b7111252ee3a0deb58e6471b06df58587
2017-04-04 03:51:31 +00:00
Martijn Coenen
c3a9e7df5f
Merge "Add target for vndservice_contexts." into oc-dev
2017-04-04 03:41:47 +00:00
Jeff Vander Stoep
6875f9d16c
Merge "adbd/shell: grant access to sepolicy for cts" into oc-dev am: bab5872cb1
...
am: 2afd33839f
Change-Id: I8447d7aeefdfd314244c16c223b23219fd95bbc4
2017-04-04 02:18:27 +00:00
Jeff Vander Stoep
2afd33839f
Merge "adbd/shell: grant access to sepolicy for cts" into oc-dev
...
am: bab5872cb1
Change-Id: I0341e66bd3a8fcbddf9daf7da84187430b5747d6
2017-04-04 02:10:57 +00:00
TreeHugger Robot
bab5872cb1
Merge "adbd/shell: grant access to sepolicy for cts" into oc-dev
2017-04-04 02:01:43 +00:00
Ningyuan Wang
b5efa1c88c
Merge "Remove unused wificond sepolicy for dropping privileges" into oc-dev am: 9337a4dd87
...
am: 2ec492f1a2
Change-Id: I996307180bc21742c5039ab53a6d9764925916ad
2017-04-03 23:49:17 +00:00
Ningyuan Wang
2ec492f1a2
Merge "Remove unused wificond sepolicy for dropping privileges" into oc-dev
...
am: 9337a4dd87
Change-Id: Ib3273650207e0b64cdca1d6e0e3bbdf48d292a6b
2017-04-03 23:41:51 +00:00
Ningyuan Wang
9337a4dd87
Merge "Remove unused wificond sepolicy for dropping privileges" into oc-dev
2017-04-03 23:31:39 +00:00
Jeff Vander Stoep
892d1e40ce
adbd/shell: grant access to sepolicy for cts
...
Test: Test: make cts && \
cts-tradefed run singleCommand cts --skip-device-info \
--skip-preconditions --skip-connectivity-check --abi arm64-v8a \
--module CtsSecurityHostTestCases \
-t android.security.cts.SELinuxHostTest#testNoExemptionsForBinderInVendorBan
Fails as expected.
Bug: 36002573
Change-Id: I298c526789b25734d5f18666c64497e5d1e181d0
2017-04-03 16:31:09 -07:00
Martijn Coenen
6676c234fc
Add target for vndservice_contexts.
...
So we can limit vndservicemanager access to
just vndservice_contexts.
Bug: 36052864
Test: servicemanager,vndservicemanager work
Change-Id: I7b132d4f616ba1edd0daf7be750d4b7174c4e188
2017-04-03 15:39:42 -07:00
Tom Cherry
9e1e2d242f
Merge "Grant vdc access to kmsg" into oc-dev am: 0c31c85a28
...
am: 81e1c12f56
Change-Id: I08fa8d70c193dfc2c8c79f41b546bbb564b3822f
2017-04-03 22:12:47 +00:00
Tom Cherry
81e1c12f56
Merge "Grant vdc access to kmsg" into oc-dev
...
am: 0c31c85a28
Change-Id: I2e6c151eb6b3413054f52d0dea5ab93c91065319
2017-04-03 22:06:05 +00:00
Tom Cherry
0c31c85a28
Merge "Grant vdc access to kmsg" into oc-dev
2017-04-03 21:58:44 +00:00
Shubang Lu
50c84c5a58
Merge "Add sepolicy for tv.input" into oc-dev am: a1c0650898
...
am: 7e9f535288
Change-Id: Ib23d7b2edadfbc7d188d21d5142f28e7c19b45ac
2017-04-03 20:08:29 +00:00
Shubang Lu
7e9f535288
Merge "Add sepolicy for tv.input" into oc-dev
...
am: a1c0650898
Change-Id: I7e586b6bf9c22ab0380f9982889f0c8c86115df1
2017-04-03 20:00:43 +00:00
Shubang Lu
a1c0650898
Merge "Add sepolicy for tv.input" into oc-dev
2017-04-03 19:55:53 +00:00
Alex Klyubin
304d653637
Move TEE rules to vendor image
...
"tee" domain is a vendor domain. Hence its rules should live on the
vendor image.
What's left as public API is that:
1. tee domain exists and that it is permitted to sys_rawio capability,
2. tee_device type exists and apps are not permitted to access
character devices labeled tee_device.
If you were relying on system/sepolicy automatically labeling
/dev/tf_driver as tee_device or labeling /system/bin/tf_daemon as
tee_exec, then you need to add these rules to your device-specific
file_contexts.
Test: mmm system/sepolicy
Test: bullhead, angler, and sailfish boot up without new denials
Bug: 36714625
Bug: 36714625
Bug: 36720355
Change-Id: Ie21619ff3c44ef58675c369061b4afdd7e8501c6
2017-04-03 11:11:48 -07:00
Ningyuan Wang
9576785df5
Remove unused wificond sepolicy for dropping privileges
...
Bug: 36855921
Test: compile, wifi works with toggling
Change-Id: Ib0819a2d552472e482e192a69530441cfc2c0fd7
2017-04-03 10:27:39 -07:00
TreeHugger Robot
f3f2b0717b
Merge "Sepolicy: Add ASAN-Extract"
2017-04-03 15:33:27 +00:00
Daniel Nicoara
24c6334cc8
Merge "VR: Add sepolicy for VR HWC service" into oc-dev am: ed82acb912
...
am: 888bc0bbee
Change-Id: Ic14649c9ecba4879547300030717e2176ce8ca53
2017-04-03 14:42:35 +00:00
Daniel Nicoara
888bc0bbee
Merge "VR: Add sepolicy for VR HWC service" into oc-dev
...
am: ed82acb912
Change-Id: I2c7dc59f0ea468fba1e34d38a55cc2e8e6cc3289
2017-04-03 14:40:02 +00:00
TreeHugger Robot
ed82acb912
Merge "VR: Add sepolicy for VR HWC service" into oc-dev
2017-04-03 14:17:09 +00:00
Ningyuan Wang
6fb8c9c60a
Merge "Remove unused wificond sepolicy privilges" into oc-dev am: a299bc8028
...
am: 3c0561b13f
Change-Id: I05d63291a5e7af356e158483255ce1c5b73a1539
2017-04-02 04:00:21 +00:00
Ningyuan Wang
3c0561b13f
Merge "Remove unused wificond sepolicy privilges" into oc-dev
...
am: a299bc8028
Change-Id: I94b99a1ace48fafeb47280d1d6764cac70fb9464
2017-04-02 03:57:55 +00:00
Ningyuan Wang
a299bc8028
Merge "Remove unused wificond sepolicy privilges" into oc-dev
2017-04-02 03:53:06 +00:00
Jeffrey Vander Stoep
14f2127c04
Merge "Ban core components from accessing vendor data types" into oc-dev am: 814edf8c90
...
am: f9b6368a56
Change-Id: I94973e72c33c15d0c856df05ec3a12f2490f170d
2017-04-01 14:27:39 +00:00
Jeffrey Vander Stoep
f9b6368a56
Merge "Ban core components from accessing vendor data types" into oc-dev
...
am: 814edf8c90
Change-Id: I9a8cd19a081ab7731f8caf098e406d0af9ce9c48
2017-04-01 14:24:39 +00:00
Jeffrey Vander Stoep
814edf8c90
Merge "Ban core components from accessing vendor data types" into oc-dev
2017-04-01 14:20:37 +00:00
Jeff Vander Stoep
50563c0367
Ban core components from accessing vendor data types
...
Vendor and system components are only allowed to share files by
passing open FDs over HIDL. Ban all directory access and all file
accesses other than what can be applied to an open FD such as
ioctl/stat/read/write/append.
This commit asserts that core components marked with attribute
coredomain may only access core data types marked with attribute
core_data_file_type.
A temporary exemption is granted to domains that currently rely on
access.
(cherry picked from commit cd97e71084
)
Bug: 34980020
Test: build Marlin policy
Change-Id: I2f0442f2628fbac1f2f7aa5ddf2a13e16b2546cc
2017-04-01 07:16:40 -07:00
TreeHugger Robot
5cb81f59c5
Merge "Ban core components from accessing vendor data types"
2017-04-01 04:43:18 +00:00
Vishwath Mohan
e2108fd560
Merge "Refactor sanitized library on-disk layout - SELinux." into oc-dev am: 45f699c792
...
am: 99575587f4
Change-Id: Ifc2a968afc41bebeea83b2a8291661e8ea367219
2017-04-01 04:38:47 +00:00
Vishwath Mohan
99575587f4
Merge "Refactor sanitized library on-disk layout - SELinux." into oc-dev
...
am: 45f699c792
Change-Id: Ib868a803f480a3c756102e59d49275b6eb4e6372
2017-04-01 04:28:54 +00:00
TreeHugger Robot
45f699c792
Merge "Refactor sanitized library on-disk layout - SELinux." into oc-dev
2017-04-01 04:18:33 +00:00
Jeff Vander Stoep
8efb8b684b
Merge "domain: grant all domains access to zoneinfo" into oc-dev am: 386f946025
...
am: 035a04245f
Change-Id: I154a39ee1247c057fc7e9bc587da3e04a565f912
2017-04-01 02:05:20 +00:00
Jeff Vander Stoep
035a04245f
Merge "domain: grant all domains access to zoneinfo" into oc-dev
...
am: 386f946025
Change-Id: Ieba3686f331cfa1c3a0907bf15db188a19d3f140
2017-04-01 01:59:50 +00:00
TreeHugger Robot
386f946025
Merge "domain: grant all domains access to zoneinfo" into oc-dev
2017-04-01 01:55:52 +00:00