Skip to content
Snippets Groups Projects
  1. Apr 12, 2018
  2. Apr 11, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-readable for sys.boot_completed and dev.bootcomplete · ac2e4cce
      Jaekyun Seok authored
      Bug: 75987246
      Test: succeeded builing and tested with taimen
      Change-Id: I2d8bc91c305e665ed9c69459e51204117afb3eee
      ac2e4cce
    • Jeff Vander Stoep's avatar
      hal_tetheroffload: move hwservice mapping to core policy · 3a346ea7
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { find } for
      interface=android.hardware.tetheroffload.config::IOffloadConfig
      scontext=u:r:system_server:s0
      tcontext=u:object_r:default_android_hwservice:s0
      tclass=hwservice_manager
      
      Bug: 77855688
      Test: build/boot Sailfish, turn on tethering, no selinux denial
      Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
      3a346ea7
    • TreeHugger Robot's avatar
      2e532d40
    • TreeHugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · 443a43c9
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } for comm="ip6tables" capability=24
      scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0
      tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c
      443a43c9
    • Joel Galenson's avatar
      Widen crash_dump dontaudit. · a01e9313
      Joel Galenson authored
      We have seen crash_dump denials for radio_data_file,
      shared_relro_file, shell_data_file, and vendor_app_file.  This commit
      widens an existing dontaudit to include them as well as others that we
      might see.
      
      Bug: 77908066
      Test: Boot device.
      Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
      (cherry picked from commit a3b3bdbb)
      a01e9313
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · e477c781
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      (cherry picked from commit bf4afae1)
      e477c781
  3. Apr 10, 2018
  4. Apr 09, 2018
  5. Apr 07, 2018
  6. Apr 06, 2018
    • Mikhail Naganov's avatar
      Add shell:fifo_file permission for audioserver · c5815891
      Mikhail Naganov authored
      Bug: 73405145
      Test: cts-tradefed run cts -m CtsMediaTestCases -t android.media.cts.AudioRecordTest#testRecordNoDataForIdleUids
      Change-Id: I09bdb74c9ecc317ea090643635ca26165efa423a
      c5815891
    • Yifan Hong's avatar
    • Yifan Hong's avatar
      hal_health: allow to write kernel logs. · 306b2671
      Yifan Hong authored
      This is originally allowed in healthd but the permission
      was not transfered to health HAL. A typical health HAL
      implementation is likely to write battery info to kernel
      logs.
      
      Test: device has battery kernel logs with health HAL
            but without healthd
      
      Bug: 77661605
      
      Change-Id: Ib3b5d3fe6bdb3df2a240c85f9d27b863153805d2
      306b2671
    • Florian Mayer's avatar
      Grant traced_probes search on directories. · 269c9665
      Florian Mayer authored
      This is needed to be able to scan the labels we have
      permission on.
      
      Denial:
      
      04-06 12:52:22.674   874   874 W traced_probes: type=1400 audit(0.0:10314): avc: denied { search } for name="backup" dev="sda45" ino=6422529 scontext=u:r:traced_probes:s0 tcontext=u:object_r:backup_data_file:s0 tclass=dir permissive=0
      
      Bug: 73625480
      
      cherry-picked from aosp/658243
      Change-Id: I52f3865952004bfc6fe22c488d768276866f8ae1
      Merged-In: I52f3865952004bfc6fe22c488d768276866f8ae1
      269c9665
    • Alan Stokes's avatar
      Installd doesn't need to create cgroup files. · 8e8c1093
      Alan Stokes authored
      cgroupfs doesn't allow files to be created, so this can't be needed.
      
      Also remove redundant neverallow and dontaudit rules. These are now
      more broadly handled by domain.te.
      
      Bug: 74182216
      
      Test: Denials remain silenced.
      
      Change-Id: If7eb0e59f567695d987272a2fd36dbc251516e9f
      8e8c1093
    • Alan Stokes's avatar
      Add /sys/kernel/memory_state_time to sysfs_power. · a8b3634d
      Alan Stokes authored
      This allows system_server to access it for determining battery stats
      (see KernelMemoryBandwidthStats.java).
      
      batterystats-wo: type=1400 audit(0.0:429): avc: denied { read } for name="show_stat" dev="sysfs" ino=48071 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
      
      Bug: 72643420
      Bug: 73947096
      
      Test: Denial is no longer present.
      Change-Id: Ibe46aee48eb3f78fa5a9d1f36602c082c33036f7
      a8b3634d
  7. Apr 05, 2018
  8. Apr 04, 2018
  9. Apr 03, 2018
  10. Apr 02, 2018
  11. Mar 31, 2018
  12. Mar 30, 2018
    • TreeHugger Robot's avatar
    • TreeHugger Robot's avatar
    • Chenbo Feng's avatar
      Allow netutils_wrapper to use pinned bpf program · be9b15c5
      Chenbo Feng authored
      The netutils_wrapper is a process used by vendor code to update the
      iptable rules on devices. When it update the rules for a specific chain.
      The iptable module will reload the whole chain with the new rule. So
      even the netutils_wrapper do not need to add any rules related to xt_bpf
      module, it will still reloading the existing iptables rules about xt_bpf
      module and need pass through the selinux check again when the rules are
      reloading. So we have to grant it the permission to reuse the pinned
      program in fs_bpf when it modifies the corresponding iptables chain so
      the vendor module will not crash anymore.
      
      Test: device boot and no more denials from netutils_wrapper
      Bug: 72111305
      Change-Id: I62bdfd922c8194c61b13e2855839aee3f1e349be
      (cherry picked from aosp commit 2623ebcf)
      be9b15c5
Loading