Skip to content
Snippets Groups Projects
  1. Jul 27, 2017
  2. Jul 26, 2017
    • Jeff Vander Stoep's avatar
      Merge "cgroup: allow associate to tmpfs" · 1bc17b61
      Jeff Vander Stoep authored
      am: 5a30eadc
      
      Change-Id: I02b0984e1ecb119e2793d01a950e2e643d3ea5c8
      1bc17b61
    • Treehugger Robot's avatar
      5a30eadc
    • Jeff Vander Stoep's avatar
      Merge "system_server: read symlinks in /cache" · 3d765cfd
      Jeff Vander Stoep authored
      am: 825173e3
      
      Change-Id: Ic7acb327cf684e6b82b1d40b408c039e02c0a7fd
      3d765cfd
    • Treehugger Robot's avatar
      825173e3
    • Jeff Vander Stoep's avatar
      cgroup: allow associate to tmpfs · 5dcaa67b
      Jeff Vander Stoep authored
      Allows groups to be mounted at /dev/memcg
      
      Addresses:
      avc: denied { associate } for comm="init" name="memcg"
      scontext=u:object_r:cgroup:s0 tcontext=u:object_r:tmpfs:s0
      tclass=filesystem permissive=0
      
      Bug: 64067152
      Test: build
      Change-Id: Ic8f641e841fe09c8f7fd487ed67cf0ab4860a1cc
      5dcaa67b
    • Jeff Vander Stoep's avatar
      system_server: read symlinks in /cache · a4cada74
      Jeff Vander Stoep authored
      type=1400 audit(0.0:6): avc: denied { read } for comm="Thread-5"
      name="cache" dev="dm-0" ino=13 scontext=u:r:system_server:s0
      tcontext=u:object_r:cache_file:s0 tclass=lnk_file permissive=0
      
      Bug: 64067152
      Test: build
      Change-Id: Ie90c0343a834aa87b7ded41f503e05d9b63b3244
      a4cada74
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove proc access · ad95219c
      Jeff Vander Stoep authored
      am: c15d54ef
      
      Change-Id: I5b47e2ced9dd5aa92727076e4cef0cc4ebaeaf7c
      ad95219c
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove proc access · c15d54ef
      Jeff Vander Stoep authored
      Remove "granted" logspam. Grante the observed permissions to the
      individual processes that need them and remove the permission from
      domain_deprecated.
      
      avc: granted { read open } for comm="ndroid.settings"
      path="/proc/version" dev="proc" ino=4026532081
      scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { getattr } for comm=4173796E635461736B202332
      path="/proc/pagetypeinfo" dev="proc" ino=4026532129
      scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="uncrypt" path="/proc/cmdline"
      dev="proc" ino=4026532072 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="update_engine"
      path="/proc/sys/kernel/random/boot_id" dev="proc" ino=15852829
      scontext=u:r:update_engine:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="tiveportallogin"
      path="/proc/vmstat" dev="proc" ino=4026532130
      scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:proc:s0
      tclass=file
      
      This change is specifically not granting the following since it
      should not be allowed:
      avc: granted { read open } for comm="crash_dump64"
      path="/proc/filesystems" dev="proc" ino=4026532416
      scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { read } for comm="crash_dump64" name="filesystems"
      dev="proc" ino=4026532416 scontext=u:r:dex2oat:s0
      tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { getattr } for comm="crash_dump64"
      path="/proc/filesystems" dev="proc" ino=4026532416
      scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 64032843
      Bug: 28760354
      Test: build
      Change-Id: Ib309e97b6229bdf013468dca34f606c0e8da96d0
      c15d54ef
  3. Jul 25, 2017
  4. Jul 24, 2017
  5. Jul 23, 2017
    • Jeff Vander Stoep's avatar
      domain_deprecate: remove system_data_file access · 2b75437d
      Jeff Vander Stoep authored
      scontext=installd
      avc: granted { getattr } for comm="Binder:1153_7" path="/data/user/0"
      dev="sda13" ino=1097730 scontext=u:r:installd:s0
      tcontext=u:object_r:system_data_file:s0 tclass=lnk_file
      
      scontext=runas
      avc: granted { getattr } for comm="run-as" path="/data/user/0"
      dev="sda35" ino=942082 scontext=u:r:runas:s0
      tcontext=u:object_r:system_data_file:s0 tclass=lnk_file
      
      scontext=vold
      avc: granted { getattr } for comm="vold" path="/data/data" dev="sda45"
      ino=12 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0
      tclass=lnk_file
      avc: granted { read } for comm="secdiscard"
      name="3982c444973581d4.spblob" dev="sda45" ino=4620302
      scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0
      tclass=file
      
      Bug: 28760354
      Test: Build
      Change-Id: Id16c43090675572af35f1ad9defd4c368abc906b
      2b75437d
  6. Jul 20, 2017
    • Josh Gao's avatar
      crash_dump_fallback: allow writing to system_server pipes. · 762a2b85
      Josh Gao authored
      am: 3c9b9197
      
      Change-Id: If292e297a21af84c35131ed42c2a65658bec2ed9
      762a2b85
    • Josh Gao's avatar
      crash_dump_fallback: allow writing to system_server pipes. · 3c9b9197
      Josh Gao authored
      Allow mediacodec/mediaextractor to write to system_server pipes during
      ANR dumps.
      
      Addresses the following denials:
      avc: denied { write } for comm="mediaextractor" path="pipe:[1177610]" dev="pipefs" ino=1177610 scontext=u:r:mediaextractor:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0
      avc: denied { write } for comm="omx@1.0-service" path="pipe:[1175808]" dev="pipefs" ino=1175808 scontext=u:r:mediacodec:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0
      
      Bug: http://b/63801592
      Test: treehugger
      Change-Id: I944b1fa76c70402607ccd903be17dbddeaa73201
      3c9b9197
  7. Jul 19, 2017
  8. Jul 18, 2017
  9. Jul 16, 2017
    • Tianjie Xu's avatar
      Allow update_engine to read postinstall_mnt_dir · 8f687053
      Tianjie Xu authored
      The denial message:
      update_engine: type=1400 audit(0.0:15213): avc: denied { getattr } for
      path="/postinstall" dev="dm-0" ino=38 scontext=u:r:update_engine:s0
      tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0
      
      update_engine: type=1400 audit(0.0:15214): avc: denied { sys_rawio } for
      capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      
      auditd  : type=1400 audit(0.0:15213): avc: denied { getattr } for
      comm="update_engine" path="/postinstall" dev="dm-0" ino=38
      scontext=u:r:update_engine:s0 tcontext=u:object_r:postinstall_mnt_dir:s0
      tclass=dir permissive=0
      
      update_engine: [0428/070905:ERROR:utils.cc(716)] Error stat'ing /postinstall: Permission denied
      
      Bug: 37760573
      Test: apply an update and UE reads postinstall_mnt_dir without denial.
      Change-Id: I55506f5e8544233f60ccf7c1df846c9c93946a25
      8f687053
    • Lorenzo Colitti's avatar
      Explicitly allow netd to take the iptables lock. · f692d2fd
      Lorenzo Colitti authored
      am: 9273c1bb
      
      Change-Id: Ie4aec7f6b6cfe675bd69df399fa63ef1194b84ac
      f692d2fd
    • Lorenzo Colitti's avatar
      Explicitly allow netd to take the iptables lock. · 9273c1bb
      Lorenzo Colitti authored
      This was previously relying on domain_deprecated rules deleted in
      change I588a1e7ea7ef984907b79a5a391efb2dcd6e6431.
      
      Bug: 28760354
      Test: unbreaks networking on AOSP bullhead
      Change-Id: I873e1f08f72104dee7509e45b1db0b284ca56085
      9273c1bb
  10. Jul 13, 2017
Loading