Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

system_server.te

Blame
    • Nick Kralevich's avatar
      8044129f
      system_server: allow appendable file descriptors · 8044129f
      Nick Kralevich authored
      system_server is currently allowed write (but not open) access to
      various app file descriptor types, to allow it to perform write
      operations on file descriptors passed to it from Android processes.
      However, system_server was not allowed to handle file descriptors
      open only for append operations.
      
      Write operations are a superset of that allowed by appendable
      operations, so it makes no sense to deny system_server the use of
      appendable file descriptors. Allow it for app data types, as well as a
      few other types (for robustness).
      
      Addresses the following denial generated when adb bugreport is run:
      
        type=1400 audit(0.0:12): avc: denied { append } for
        path="/data/user_de/0/com.android.shell/files/bugreports/bugreport-MASTER-2016-10-29-08-13-50-dumpstate_log-6214.txt"
        dev="dm-2" ino=384984 scontext=u:r:system_server:s0
        tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=0
      
      Bug: 32246161
      Test: policy compiles
      Test: No more append denials when running adb shell am bug-report --progress
      Change-Id: Ia4e81cb0b3c3580fa9130952eedaed9cab3e8487
      8044129f
      History
      system_server: allow appendable file descriptors
      Nick Kralevich authored
      system_server is currently allowed write (but not open) access to
      various app file descriptor types, to allow it to perform write
      operations on file descriptors passed to it from Android processes.
      However, system_server was not allowed to handle file descriptors
      open only for append operations.
      
      Write operations are a superset of that allowed by appendable
      operations, so it makes no sense to deny system_server the use of
      appendable file descriptors. Allow it for app data types, as well as a
      few other types (for robustness).
      
      Addresses the following denial generated when adb bugreport is run:
      
        type=1400 audit(0.0:12): avc: denied { append } for
        path="/data/user_de/0/com.android.shell/files/bugreports/bugreport-MASTER-2016-10-29-08-13-50-dumpstate_log-6214.txt"
        dev="dm-2" ino=384984 scontext=u:r:system_server:s0
        tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=0
      
      Bug: 32246161
      Test: policy compiles
      Test: No more append denials when running adb shell am bug-report --progress
      Change-Id: Ia4e81cb0b3c3580fa9130952eedaed9cab3e8487