Skip to content
Snippets Groups Projects
  1. Apr 13, 2018
    • TreeHugger Robot's avatar
    • TreeHugger Robot's avatar
    • Joel Galenson's avatar
      Track storaged SELinux denial. · 2b840913
      Joel Galenson authored
      This should help fix presubmit tests.
      
      Bug: 77634061
      Test: Built policy.
      Change-Id: Ib9f15c93b71c2b67f25d4c9f949a5e2b3ce93b9c
      (cherry picked from commit c6b5a96b)
      2b840913
    • TreeHugger Robot's avatar
    • Joel Galenson's avatar
      Allow some vold_prepare_subdirs denials. · 44b6a7c3
      Joel Galenson authored
      This addresses the following denials:
      
      avc: denied { fowner } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=file
      avc: denied { relabelfrom } for comm="vold_prepare_su" name="storaged" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 77875245
      Test: Boot device.
      Test: Mislabel directories used by vold_prepare_subdirs, reboot, and
      ensure it can relabel them without denials.
      Test: Add user, reboot, delete user, reboot, observe no denials.
      
      (cherry picked from commit 855dd5a8)
      
      Merged-In: Id67bc99f151a6ccb9619bbfb7080452956405121
      Change-Id: Ic86be1e1afed37602255448e5700811d197403f9
      44b6a7c3
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · a11b16c9
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      Merged-In: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      (cherry picked from commit 224921d1)
      a11b16c9
  2. Apr 12, 2018
    • TreeHugger Robot's avatar
      cb336d89
    • Florian Mayer's avatar
      Make traced_probes mlstrustedsubject. · e3919e95
      Florian Mayer authored
      Denials:
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5684): avc: denied { search } for name="1376" dev="proc" ino=204553 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app_27:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5685): avc: denied { search } for name="1402" dev="proc" ino=204554 scontext=u:r:traced_probes:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.801   903   903 W traced_probes: type=1400 audit(0.0:5686): avc: denied { search } for name="1496" dev="proc" ino=204557 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app:s0:c85,c256,c512,c768 tclass=dir permissive=0
      04-12 12:42:47.805   903   903 W traced_probes: type=1400 audit(0.0:5687): avc: denied { search } for name="1758" dev="proc" ino=204563 scontext=u:r:traced_probes:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=dir permissive=0
      
      Bug: 77955286
      
      Change-Id: If0985d3ddd7d14c2b139be1c842c9c8df99b90db
      e3919e95
    • TreeHugger Robot's avatar
  3. Apr 11, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-readable for sys.boot_completed and dev.bootcomplete · ac2e4cce
      Jaekyun Seok authored
      Bug: 75987246
      Test: succeeded builing and tested with taimen
      Change-Id: I2d8bc91c305e665ed9c69459e51204117afb3eee
      ac2e4cce
    • Jeff Vander Stoep's avatar
      hal_tetheroffload: move hwservice mapping to core policy · 3a346ea7
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { find } for
      interface=android.hardware.tetheroffload.config::IOffloadConfig
      scontext=u:r:system_server:s0
      tcontext=u:object_r:default_android_hwservice:s0
      tclass=hwservice_manager
      
      Bug: 77855688
      Test: build/boot Sailfish, turn on tethering, no selinux denial
      Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
      3a346ea7
    • TreeHugger Robot's avatar
      2e532d40
    • TreeHugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · 443a43c9
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } for comm="ip6tables" capability=24
      scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0
      tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c
      443a43c9
    • Joel Galenson's avatar
      Widen crash_dump dontaudit. · a01e9313
      Joel Galenson authored
      We have seen crash_dump denials for radio_data_file,
      shared_relro_file, shell_data_file, and vendor_app_file.  This commit
      widens an existing dontaudit to include them as well as others that we
      might see.
      
      Bug: 77908066
      Test: Boot device.
      Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
      (cherry picked from commit a3b3bdbb)
      a01e9313
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · e477c781
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      (cherry picked from commit bf4afae1)
      e477c781
  4. Apr 10, 2018
  5. Apr 09, 2018
  6. Apr 07, 2018
  7. Apr 06, 2018
    • Mikhail Naganov's avatar
      Add shell:fifo_file permission for audioserver · c5815891
      Mikhail Naganov authored
      Bug: 73405145
      Test: cts-tradefed run cts -m CtsMediaTestCases -t android.media.cts.AudioRecordTest#testRecordNoDataForIdleUids
      Change-Id: I09bdb74c9ecc317ea090643635ca26165efa423a
      c5815891
    • Yifan Hong's avatar
    • Yifan Hong's avatar
      hal_health: allow to write kernel logs. · 306b2671
      Yifan Hong authored
      This is originally allowed in healthd but the permission
      was not transfered to health HAL. A typical health HAL
      implementation is likely to write battery info to kernel
      logs.
      
      Test: device has battery kernel logs with health HAL
            but without healthd
      
      Bug: 77661605
      
      Change-Id: Ib3b5d3fe6bdb3df2a240c85f9d27b863153805d2
      306b2671
    • Florian Mayer's avatar
      Grant traced_probes search on directories. · 269c9665
      Florian Mayer authored
      This is needed to be able to scan the labels we have
      permission on.
      
      Denial:
      
      04-06 12:52:22.674   874   874 W traced_probes: type=1400 audit(0.0:10314): avc: denied { search } for name="backup" dev="sda45" ino=6422529 scontext=u:r:traced_probes:s0 tcontext=u:object_r:backup_data_file:s0 tclass=dir permissive=0
      
      Bug: 73625480
      
      cherry-picked from aosp/658243
      Change-Id: I52f3865952004bfc6fe22c488d768276866f8ae1
      Merged-In: I52f3865952004bfc6fe22c488d768276866f8ae1
      269c9665
    • Alan Stokes's avatar
      Installd doesn't need to create cgroup files. · 8e8c1093
      Alan Stokes authored
      cgroupfs doesn't allow files to be created, so this can't be needed.
      
      Also remove redundant neverallow and dontaudit rules. These are now
      more broadly handled by domain.te.
      
      Bug: 74182216
      
      Test: Denials remain silenced.
      
      Change-Id: If7eb0e59f567695d987272a2fd36dbc251516e9f
      8e8c1093
    • Alan Stokes's avatar
      Add /sys/kernel/memory_state_time to sysfs_power. · a8b3634d
      Alan Stokes authored
      This allows system_server to access it for determining battery stats
      (see KernelMemoryBandwidthStats.java).
      
      batterystats-wo: type=1400 audit(0.0:429): avc: denied { read } for name="show_stat" dev="sysfs" ino=48071 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
      
      Bug: 72643420
      Bug: 73947096
      
      Test: Denial is no longer present.
      Change-Id: Ibe46aee48eb3f78fa5a9d1f36602c082c33036f7
      a8b3634d
  8. Apr 05, 2018
  9. Apr 04, 2018
  10. Apr 03, 2018
  11. Apr 02, 2018
    • Jaekyun Seok's avatar
      Allow vendor_init_settable for persist.sys.sf.native_mode · d2a6c235
      Jaekyun Seok authored
      A default value of persist.sys.sf.native_mode could be set by SoC
      partners in some devices including some pixels.
      So it should have vendor_init_settable accessibility.
      
      Bug: 74266614
      Test: succeeded building and tested with a pixel device with
      PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true.
      
      Change-Id: I5d7a029f82505983d21dc722541fb55761a8714d
      Merged-In: I5d7a029f82505983d21dc722541fb55761a8714d
      (cherry picked from commit 0dc35873)
      d2a6c235
Loading