Skip to content
Snippets Groups Projects
  1. Nov 09, 2017
    • Jeff Vander Stoep's avatar
      Allow vendor apps to use surfaceflinger_service · 63f46773
      Jeff Vander Stoep authored
      Vendor apps may only use servicemanager provided services
      marked as app_api_service. surfaceflinger_service should be
      available to vendor apps, so add this attribute and clean up
      duplicate grants.
      
      Addresses:
      avc:  denied  { find } scontext=u:r:qtelephony:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      avc:  denied  { find } scontext=u:r:ssr_detector:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      avc:  denied  { find } scontext=u:r:qcneservice:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      
      Bug: 69064190
      Test: build
      Change-Id: I00fcf43b0a8bde232709aac1040a5d7f4792fa0f
      63f46773
    • Treehugger Robot's avatar
      b43a1c84
    • Treehugger Robot's avatar
      a1de83d6
  2. Nov 08, 2017
  3. Nov 07, 2017
  4. Nov 06, 2017
  5. Nov 03, 2017
    • Tri Vo's avatar
      radio: neverallow access to proc and sysfs types. · 5aac163b
      Tri Vo authored
      Bug: 65643247
      Test: build aosp_sailfish-userdebug
      Test: build walleye-userdebug from internal
      This CL does not change runtime behavior.
      Change-Id: I82c520579b986ea2a4a6f030ec60d5345c00b54f
      5aac163b
  6. Nov 02, 2017
  7. Nov 01, 2017
  8. Oct 31, 2017
    • Tri Vo's avatar
      Neverallow coredomain to kernel interface files. · 502e43f7
      Tri Vo authored
      Core domains should not be allowed access to kernel interfaces,
      which are not explicitly labeled. These interfaces include
      (but are not limited to):
      
      1. /proc
      2. /sys
      3. /dev
      4. debugfs
      5. tracefs
      6. inotifyfs
      7. pstorefs
      8. configfs
      9. functionfs
      10. usbfs
      11. binfmt_miscfs
      
      We keep a lists of exceptions to the rule, which we will be gradually shrinking.
      This will help us prevent accidental regressions in our efforts to label
      kernel interfaces.
      
      Bug: 68159582
      Test: bullhead, sailfish can build
      Change-Id: I8e466843e1856720f30964546c5c2c32989fa3a5
      502e43f7
    • Yifan Hong's avatar
      hal_health_default: permissions for default impl · 87ef6049
      Yifan Hong authored
      Default health service needs following permissions to work:
      - read /sys/class/power_supply
      - uevent
      - wakelock
      
      Bug: 63702641
      Test: no denials for health service
      
      Change-Id: I2f3aed3ef3b5ac024da17d9d5400d9834038df9f
      87ef6049
  9. Oct 30, 2017
    • Jin Qian's avatar
      Allow dumpstate to access netlink_generic_socket · 98e99fb4
      Jin Qian authored
      avc: denied { create } for scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_generic_socket permissive=0
      avc: denied { create } for comm="iotop" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_generic_socket permissive=0
      
      Bug: 68040531
      Change-Id: I24a8a094d1b5c493cc695e332c927972f99ae49c
      98e99fb4
  10. Oct 27, 2017
    • Treehugger Robot's avatar
    • Calin Juravle's avatar
      Allow installd to read system_data_file:lnk_file · 97b08903
      Calin Juravle authored
      The permission was removed in
      https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/433615/
      but is still needed in order to optimize application code.
      
      Denial example:
      
      10-26 16:29:51.234   894  1469 D PackageManager.DexOptimizer: Running
      dexopt on: /data/user/0/com.google.android.gms/snet/installed/snet.jar
      pkg=com.google.android.gms isa=[arm64]
      dexoptFlags=boot_complete,public,secondary,force,storage_ce
      target-filter=quicken
      
      10-26 16:29:51.253  2148  2148 W Binder:695_5: type=1400 audit(0.0:39):
      avc: denied { read } for name="0" dev="sda35" ino=917506
      scontext=u:r:installd:s0 tcontext=u:object_r:system_data_file:s0
      tclass=lnk_file permissive=0
      
      Test: adb shell cmd package reconcile-secondary-dex-files
      com.google.android.googlequicksearchbox
      adb shell cmd package compile -m speed --secondary-dex
      com.google.android.gms
      
      Change-Id: I694d1a780e58fa953d9ebda807f5f5293dbb0d56
      97b08903
  11. Oct 26, 2017
    • Tri Vo's avatar
      Recovery: remove sysfs access · c1329604
      Tri Vo authored
      Bug: 65643247
      Test: adb sideload an ota package
      Test: mount /system
      Test: view recovery logs
      Test: run graphics test
      Test: run locale test
      Test: wipe data/factory reset
      Test: factory reset from Settings app
      Tested on sailfish; no selinux denials to sysfs type are observed.
      
      Change-Id: Ic8487d53d90b7d1d050574e0b084627d1b6abdba
      c1329604
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      recovery: fix denials during factory reset · 7e5c2883
      Tri Vo authored
      Addresses these denials when wiping data on sailfish:
      
      avc:  denied  { open } for  pid=488 comm="mke2fs_static"
      path="/proc/swaps" dev="proc" ino=4026532415 scontext=u:r:recovery:s0
      tcontext=u:object_r:proc_swaps:s0 tclass=file permissive=1
      
      avc:  denied  { search } for  pid=488 comm="mke2fs_static"
      name="features" dev="sysfs" ino=30084 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=dir permissive=1
      
      avc:  denied  { read } for  pid=488 comm="mke2fs_static"
      name="lazy_itable_init" dev="sysfs" ino=30085 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=file permissive=1
      
      Test: Wipe data/factory reset -> no selinux denials
      Change-Id: Ia9e2e4fd4a1c604c9286a558ef0fe43fd153e3bc
      7e5c2883
    • Treehugger Robot's avatar
  12. Oct 25, 2017
  13. Oct 24, 2017
Loading