platform_system_sepolicy/public
Jeff Vander Stoep 9924d782ef hal_configstore: use crash_dump fallback path
Configstore HAL uses a seccomp filter which blocks the standard
path of execing crash_dump to collect crash data. Add permission
to use crash_dump's fallback mechanism.

Allowing configstore to write to the socket provided by tombstoned
required either exempting configstore from a neverallow rule, or
removing the neverallow rule entirely. Since the neverallow rule
could potentially prevent partners for doing security hardening,
it has been removed.

Bug: 64768925
Bug: 36453956

Test: killall -ABRT android.hardware.configstore@1.1-service
    Results in a call stack in logcat, and tombstone in
    /data/tombstones
Test: configstore runs without crashing
Test: SANITIZE_TARGET="address coverage" make vts -j64
    vts-tradefedrun commandAndExit vts --skip-all-system-status-check \
    -primary-abi-only --skip-preconditions -l VERBOSE --module \
    VtsHalConfigstoreV1_0IfaceFuzzer

Change-Id: I1ed5265f173c760288d856adb9292c4026da43d6
2017-08-22 12:11:20 -07:00
..
adbd.te Move adbd policy to private 2017-02-07 09:55:05 -08:00
asan_extract.te Sepolicy: Give asan_extract access to powerctl 2017-06-27 15:38:29 -07:00
attributes Default sepolicy rules for initial upload of Neural Network API. 2017-07-25 20:42:26 +00:00
audioserver.te Move audioserver policy to private 2017-02-07 10:47:18 -08:00
blkid.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
blkid_untrusted.te Move blkid policy to private 2017-02-07 23:57:53 +00:00
bluetooth.te Move bluetooth policy to private 2017-02-06 15:29:10 -08:00
bootanim.te bootanim: is a client of configstore HAL 2017-07-26 10:12:32 -07:00
bootstat.te logd: restrict access to /dev/event-log-tags 2017-01-31 15:50:15 +00:00
bufferhubd.te SELinux policies for PDX services 2017-05-15 10:07:05 -07:00
cameraserver.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
charger.te healthd: create SEPolicy for 'charger' and reduce healthd's scope 2016-12-15 18:17:13 -08:00
clatd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
cppreopts.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
crash_dump.te Add /dev/kmsg_debug. 2017-06-27 07:20:44 -07:00
device.te resolve merge conflicts of 0040d6f0 to master 2017-07-11 12:55:12 -07:00
dex2oat.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
dhcp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
display_service_server.te Add fwk_display_hwservice. 2017-05-17 11:00:28 -07:00
dnsmasq.te remove more domain_deprecated 2016-12-09 19:57:43 -08:00
domain.te hal_configstore: use crash_dump fallback path 2017-08-22 12:11:20 -07:00
drmserver.te No access to tee domain over Unix domain sockets 2017-04-03 11:26:01 -07:00
dumpstate.te Add screencap domain. 2017-08-11 09:43:04 -07:00
e2fs.te move e2fs rules from private to public 2017-08-09 14:02:02 -07:00
ephemeral_app.te Move ephemeral_app policy to private 2017-01-09 15:34:27 -08:00
file.te Merge "Prevent access to nonplat_service_contexts on full_treble." into oc-mr1-dev 2017-08-12 12:19:42 +00:00
fingerprintd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
fsck.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
fsck_untrusted.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
gatekeeperd.te Gatekeeper no longer needs to access UserManager. 2017-06-28 20:17:51 +01:00
global_macros sepolicy: Define and allow map permission 2017-07-10 16:31:23 -04:00
hal_allocator.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_audio.te hal_audio: Allow writing dump info into pipes when capturing BR am: 9686cbcdbf am: 4aac6fdbac 2017-05-08 18:38:52 +00:00
hal_bluetooth.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_bootctl.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_camera.te hal_camera: remove video_device restriction 2017-05-16 09:42:09 -07:00
hal_cas.te cas: add CAS hal and switch to use hwservice 2017-06-16 13:28:36 -07:00
hal_configstore.te hal_configstore: use crash_dump fallback path 2017-08-22 12:11:20 -07:00
hal_contexthub.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_drm.te Merge "Allow DRM hal to access fd allocated by mediaserver" into oc-dev 2017-04-25 23:54:48 +00:00
hal_dumpstate.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_fingerprint.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_gatekeeper.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_gnss.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_graphics_allocator.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_graphics_composer.te Fix graphics composer denial. 2017-05-19 14:14:35 -07:00
hal_health.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_ir.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_keymaster.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_light.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_memtrack.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_neuralnetworks.te Default sepolicy rules for initial upload of Neural Network API. 2017-07-25 20:42:26 +00:00
hal_neverallows.te Preserve attributes needed for CTS 2017-07-05 23:06:35 +00:00
hal_nfc.te Remove access to sock_file for hal_nfc 2017-04-27 09:05:27 -07:00
hal_oemlock.te Add missing sepolicies for OemLock HAL. 2017-05-31 15:22:05 +01:00
hal_power.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_sensors.te Grant CAP_SYS_NICE to processes that need it. 2017-05-09 09:53:46 -07:00
hal_telephony.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tetheroffload.te hal_tetheroffload: Grant permissions 2017-06-29 04:24:14 +00:00
hal_thermal.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tv_cec.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_tv_input.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_usb.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_vibrator.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_vr.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hal_weaver.te Add missing sepolicies for the Weaver HAL. 2017-05-31 15:17:11 +01:00
hal_wifi.te Merge "Add sepolicy for hal_wifi to access /proc/modules" am: 6acd70b918 2017-06-22 15:45:20 +00:00
hal_wifi_offload.te SE Policy for Wifi Offload HAL 2017-05-18 09:49:55 -07:00
hal_wifi_supplicant.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
healthd.te Restrict access to hwservicemanager 2017-04-21 09:54:53 -07:00
hwservice.te thermal: sepolicy for thermalservice and Thermal HAL revision 1.1 2017-08-04 16:24:05 +00:00
hwservicemanager.te Add hwservice_contexts and support for querying it. 2017-04-12 18:07:12 -07:00
idmap.te sepolicy: restrict /vendor/overlay from most coredomains 2017-04-06 13:28:16 -07:00
incident.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
incidentd.te Add incident command and incidentd daemon se policy. 2017-02-07 15:52:07 -08:00
init.te resolve merge conflicts of 27c0aa7a to stage-aosp-master 2017-07-27 17:18:04 +00:00
inputflinger.te te_macros: introduce add_service() macro 2017-01-26 04:43:16 +00:00
install_recovery.te Fix build time warning 2017-04-21 09:42:50 -07:00
installd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
ioctl_defines Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
ioctl_macros Add TCSETS to unpriv_tty_ioctls 2016-12-07 15:59:34 -08:00
isolated_app.te Move isolated_app policy to private 2017-01-05 16:06:54 -08:00
kernel.te Split mediaprovider from priv_app. 2017-07-10 11:17:18 -07:00
keystore.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
lmkd.te sepolicy: fix support for lmkd 2017-06-13 21:07:53 -07:00
logd.te logd: add getEventTag command and service 2017-01-31 15:50:42 +00:00
logpersist.te logpersist: do not permit dynamic transition to domain 2016-12-29 09:29:36 -08:00
mdnsd.te Move mdnsd policy to private 2017-02-06 15:02:32 -08:00
mediacodec.te cas: add CAS hal and switch to use hwservice 2017-06-16 13:28:36 -07:00
mediadrmserver.te cas: add CAS hal and switch to use hwservice 2017-06-16 13:28:36 -07:00
mediaextractor.te cas: add CAS hal and switch to use hwservice 2017-06-16 13:28:36 -07:00
mediametrics.te allow media.metrics to write to file descriptor in /data 2017-04-04 10:30:50 -07:00
mediaprovider.te Split mediaprovider from priv_app. 2017-07-10 11:17:18 -07:00
mediaserver.te Allow mediaserver to access fd allocated by hal_graphics_composer 2017-04-28 17:55:20 -07:00
modprobe.te Fix coredomain violation for modprobe 2017-06-05 08:09:18 -07:00
mtp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
net.te Move netdomain policy to private 2017-02-06 15:02:00 -08:00
netd.te Merge "Add system_net_netd_hwservice." into oc-dr1-dev 2017-07-31 18:56:36 +00:00
netutils_wrapper.te add netutils_wrappers 2017-04-14 22:57:27 -07:00
neverallow_macros Ban socket connections between core and vendor 2017-03-27 08:49:13 -07:00
nfc.te Remove unnecessary rules from NFC HAL clients 2017-03-22 16:22:33 -07:00
otapreopt_chroot.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
otapreopt_slot.te Sepolicy: Give otapreopt_slot read on A/B artifact links 2017-04-07 20:19:41 -07:00
performanced.te SELinux policies for PDX services 2017-05-15 10:07:05 -07:00
perfprofd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
platform_app.te Move platform_app policy to private 2017-01-09 14:52:59 -08:00
postinstall.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
postinstall_dexopt.te Sepolicy: Fix new access from the linker for postinstall 2017-04-28 17:34:41 -07:00
ppp.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
preopt2cachename.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
priv_app.te Move priv_app policy to private 2017-01-05 15:44:32 -08:00
profman.te Allow profman to analyze profiles for the secondary dex files 2017-03-15 18:47:13 -07:00
property.te Merge "Revert "Temporarily revert the SELinux policy for persist.netd.stable_secret."" am: 580a0f2b98 am: 34bc175d4f 2017-07-13 12:40:48 +00:00
racoon.te restore permissions to /vendor for non-treble devices 2017-04-14 10:01:14 -07:00
radio.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
recovery.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
recovery_persist.te sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
recovery_refresh.te sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
rild.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
roles sepolicy: add version_policy tool and version non-platform policy. 2016-12-06 08:56:02 -08:00
runas.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
sdcardd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
service.te Merge "Allow PackageManager to create a new service" into oc-mr1-dev 2017-08-08 15:58:41 +00:00
servicemanager.te Prevent access to nonplat_service_contexts on full_treble. 2017-08-11 14:49:56 +02:00
sgdisk.te remove more domain_deprecated 2016-12-09 19:57:43 -08:00
shared_relro.te Allow shared_relro to connect to activity_service. 2017-07-24 17:38:40 -04:00
shell.te Merge "Let shell and bugreport read logging related properties." into oc-dev 2017-04-21 18:20:36 +00:00
slideshow.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
su.te Make sure all public types are defined regardless of build variants 2017-07-24 07:27:01 -07:00
surfaceflinger.te Move surfaceflinger policy to private 2017-02-07 10:06:12 -08:00
system_app.te Move system_app policy to private 2017-01-05 17:20:28 -08:00
system_server.te Move system_server policy to private 2017-02-07 20:24:05 +00:00
te_macros Validate no-cross-domain /proc/PID access am: 7a46380969 am: 881fe06f34 2017-08-11 19:22:00 +00:00
tee.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
thermalserviced.te thermal: sepolicy for thermalservice and Thermal HAL revision 1.1 2017-08-04 16:24:05 +00:00
tombstoned.te DO NOT MERGE ANYWHERE Revert "SEPolicy: Changes for new stack dumping scheme." 2017-06-23 17:36:26 +01:00
toolbox.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
tzdatacheck.te Allow the shell user to run tzdatacheck 2017-04-20 09:31:36 +00:00
ueventd.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
uncrypt.te domain_deprecated: remove sysfs rules 2017-07-27 20:03:16 +00:00
untrusted_app.te Move untrusted_app policy to private 2017-01-05 14:39:52 -08:00
untrusted_app_25.te untrusted_app: policy versioning based on targetSdkVersion 2017-02-14 13:30:12 -08:00
untrusted_v2_app.te Add new untrusted_v2_app domain 2017-02-21 12:39:55 -08:00
update_engine.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
update_engine_common.te domain_deprecated: remove sysfs rules 2017-07-27 20:03:16 +00:00
update_verifier.te Allow update_verifier to reboot the device 2017-04-04 21:07:48 +00:00
vdc.te Grant vdc access to kmsg 2017-03-31 20:48:36 +00:00
vendor_shell.te vendor_shell: add sepolicy for vendor shell 2017-04-14 09:38:51 -07:00
vendor_toolbox.te Allow init to run vendor toybox for modprobe 2017-05-24 15:01:20 -07:00
virtual_touchpad.te Allow vr_hwc and virtual_touchpad to query for permissions 2017-04-21 17:15:03 -04:00
vndservice.te Add default label and mapping for vendor services 2017-04-28 14:56:57 -07:00
vndservicemanager.te Initial sepolicy for vndservicemanager. 2017-03-23 00:20:43 +00:00
vold.te Move domain_deprecated into private policy 2017-07-24 07:39:54 -07:00
vr_hwc.te SELinux policies for PDX services 2017-05-10 16:39:19 -07:00
watchdogd.te Split general policy into public and private components. 2016-10-06 13:09:06 -07:00
webview_zygote.te Move webview_zygote policy to private 2017-01-27 17:01:43 +00:00
wificond.te Allow wificond to find permission 2017-04-04 16:52:25 -07:00
zygote.te Move zygote policy to private 2017-01-26 13:31:16 -08:00