- Nov 06, 2017
-
-
William Roberts authored
domain based tmpfs file access has getattr, read and write. However newer kernels support map. Add this map permission so they can use mmap based access. Test: build test. Change-Id: I2e128967e10a1332b3c1c908550360a52fbceaf8 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Jeff Vander Stoep authored
This will be used to enforce data separation between platform and vendor. Test: build Bug: 34980020 Change-Id: Ia312f00068d3982c7aae7e35bd0c96a6eb9ea3be
-
- Nov 03, 2017
-
-
Tri Vo authored
Bug: 65643247 Test: build aosp_sailfish-userdebug Test: build walleye-userdebug from internal This CL does not change runtime behavior. Change-Id: I82c520579b986ea2a4a6f030ec60d5345c00b54f
-
- Nov 02, 2017
-
-
Treehugger Robot authored
-
Tri Vo authored
-
Shubham Ajmera authored
Test: manual(installd flow without sepolicy denials) Bug: 67111829 Change-Id: I7ac1a86e731ec5900eec83608b4765a6818f2fd0
-
Tri Vo authored
Core domains should not be allowed access to kernel interfaces, which are not explicitly labeled. These interfaces include (but are not limited to): 1. /proc 2. /sys 3. /dev 4. debugfs 5. tracefs 6. inotifyfs 7. pstorefs 8. configfs 9. functionfs 10. usbfs 11. binfmt_miscfs We keep a lists of exceptions to the rule, which we will be gradually shrinking. This will help us prevent accidental regressions in our efforts to label kernel interfaces. Bug: 68159582 Bug: 68792382 Test: build aosp_sailfish-user Test: build aosp_sailfish-userdebug Test: CP to internal and build walleye-user Change-Id: I1b2890ce1efb02a08709a6132cf2f12f9d88fde7
-
Max Bires authored
-
Tri Vo authored
-
Tobias Thierer authored
This reverts commit 502e43f7. Reason for revert: Suspected to have broken a build, see b/68792382 Bug: 68792382 Change-Id: Ib5d465b7a50a73e3d8d8edd4e6b3426a7bde4249
-
- Nov 01, 2017
-
-
Max Bires authored
This denial affects marlin as well Test: The associated denials are properly tagged with this bug Change-Id: Ie90f1ac8c9a930465d8b806d77c2975c5f046403
-
Tri Vo authored
-
Treehugger Robot authored
-
Nick Kralevich authored
Test: code compiles. Change-Id: I2677ebdaf7ca491c60697da9d3ebf5a5d8cb5036
-
- Oct 31, 2017
-
-
Tri Vo authored
Core domains should not be allowed access to kernel interfaces, which are not explicitly labeled. These interfaces include (but are not limited to): 1. /proc 2. /sys 3. /dev 4. debugfs 5. tracefs 6. inotifyfs 7. pstorefs 8. configfs 9. functionfs 10. usbfs 11. binfmt_miscfs We keep a lists of exceptions to the rule, which we will be gradually shrinking. This will help us prevent accidental regressions in our efforts to label kernel interfaces. Bug: 68159582 Test: bullhead, sailfish can build Change-Id: I8e466843e1856720f30964546c5c2c32989fa3a5
-
Yifan Hong authored
Default health service needs following permissions to work: - read /sys/class/power_supply - uevent - wakelock Bug: 63702641 Test: no denials for health service Change-Id: I2f3aed3ef3b5ac024da17d9d5400d9834038df9f
-
- Oct 30, 2017
-
-
Jin Qian authored
avc: denied { create } for scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_generic_socket permissive=0 avc: denied { create } for comm="iotop" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_generic_socket permissive=0 Bug: 68040531 Change-Id: I24a8a094d1b5c493cc695e332c927972f99ae49c
-
- Oct 27, 2017
-
-
Treehugger Robot authored
-
Calin Juravle authored
The permission was removed in https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/433615/ but is still needed in order to optimize application code. Denial example: 10-26 16:29:51.234 894 1469 D PackageManager.DexOptimizer: Running dexopt on: /data/user/0/com.google.android.gms/snet/installed/snet.jar pkg=com.google.android.gms isa=[arm64] dexoptFlags=boot_complete,public,secondary,force,storage_ce target-filter=quicken 10-26 16:29:51.253 2148 2148 W Binder:695_5: type=1400 audit(0.0:39): avc: denied { read } for name="0" dev="sda35" ino=917506 scontext=u:r:installd:s0 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=0 Test: adb shell cmd package reconcile-secondary-dex-files com.google.android.googlequicksearchbox adb shell cmd package compile -m speed --secondary-dex com.google.android.gms Change-Id: I694d1a780e58fa953d9ebda807f5f5293dbb0d56
-
- Oct 26, 2017
-
-
Tri Vo authored
Bug: 65643247 Test: adb sideload an ota package Test: mount /system Test: view recovery logs Test: run graphics test Test: run locale test Test: wipe data/factory reset Test: factory reset from Settings app Tested on sailfish; no selinux denials to sysfs type are observed. Change-Id: Ic8487d53d90b7d1d050574e0b084627d1b6abdba
-
Treehugger Robot authored
-
Tri Vo authored
Addresses these denials when wiping data on sailfish: avc: denied { open } for pid=488 comm="mke2fs_static" path="/proc/swaps" dev="proc" ino=4026532415 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_swaps:s0 tclass=file permissive=1 avc: denied { search } for pid=488 comm="mke2fs_static" name="features" dev="sysfs" ino=30084 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=dir permissive=1 avc: denied { read } for pid=488 comm="mke2fs_static" name="lazy_itable_init" dev="sysfs" ino=30085 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=file permissive=1 Test: Wipe data/factory reset -> no selinux denials Change-Id: Ia9e2e4fd4a1c604c9286a558ef0fe43fd153e3bc
-
Treehugger Robot authored
-
- Oct 25, 2017
-
-
Paul Crowley authored
AIUI permissions should be in private unless they need to be public. Bug: 25861755 Test: Boot device, create and remove a user, observe logs Change-Id: I6c3521d50dab2d508fce4b614d51e163e7c8f3da
-
Tom Cherry authored
First pass at adding vendor_init.te Bug: 62875318 Test: boot sailfish with vendor_init Change-Id: I35cc9be324075d8baae866d6de4166c37fddac68
-
Tom Cherry authored
-
- Oct 24, 2017
-
-
Paul Crowley authored
-
Tom Cherry authored
Test: boot sailfish with no audit when writing to page-cluster Change-Id: I2bfebdf9342594d66d95daaec92d71195c93ffc8
-
Tri Vo authored
-
Paul Crowley authored
10-23 16:40:43.763 7991 7991 I auditd : type=1400 audit(0.0:79): avc: denied { open } for comm="vold_prepare_su" path="/dev/pts/1" dev="devpts" ino=4 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=0 Bug: 67901036 Test: Boot device, create user, create files, remove user, observe logs Change-Id: I8d33dfd2a0b24611773001f20101db40aeb13632
-
Bill Yi authored
-
Treehugger Robot authored
-
Tri Vo authored
New types: 1. proc_random 2. sysfs_dt_firmware_android Labeled: 1. /proc/sys/kernel/random as proc_random. 2. /sys/firmware/devicetree/base/firmware/android/{compatible, fstab, vbmeta} as sysfs_dt_firmware_android. Changed access: 1. uncrypt, update_engine, postinstall_dexopt have access to generic proc and sysfs labels removed. 2. appropriate permissions were added to uncrypt, update_engine, update_engine_common, postinstall_dexopt. Bug: 67416435 Bug: 67416336 Test: fake ota go/manual-ab-ota runs without denials Test: adb sideload runs without denials to new types Change-Id: Id31310ceb151a18652fcbb58037a0b90c1f6505a
-
- Oct 23, 2017
-
-
Max Bires authored
Instead of removing the denial generating code, a dontaudit and a service label will be provided so that the team working on this new feature doesn't have to get slowed up with local revision patches. The dontaudit should be removed upon resolution of the linked bug. Bug: 67468181 Test: statscompanion denials aren't audited Change-Id: Ib4554a7b6c714e7409ea504f5d0b82d5e1283cf7
-
Jeffrey Vander Stoep authored
am: 1b223839 Change-Id: I5502508d7548a2772dd56155c9c8e08814fce5ef
-
Jeffrey Vander Stoep authored
-
Nick Kralevich authored
am: 1ff4148c Change-Id: I6dc8530628027cdafd7929cd9ed30bb6c2e5a1bc
-
Treehugger Robot authored
-