Skip to content
Snippets Groups Projects
  1. Jan 08, 2016
  2. Jan 07, 2016
    • Nick Kralevich's avatar
      su.te: drop domain_deprecated and app auditallow rules. · 0af2aa0b
      Nick Kralevich authored
      su is in permissive all the time. We don't want SELinux log
      spam from this domain.
      
      Addresses the following logspam:
      
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/graphics/fb0/vsync_event" dev="sysfs" ino=10815 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/thermal/thermal_zone2/temp" dev="sysfs" ino=15368 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { read } for comm="sh" name="emmc_therm" dev="sysfs" ino=17583 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: I8e17d3814e41b497b25ce00cd72698f0d22b3ab0
      0af2aa0b
    • dcashman's avatar
      Allow domain to read symlinks in /sys. · cee72924
      dcashman authored
      Address the following denial:
      avc: denied { read } for name="battery" dev="sysfs" ino=17945 scontext=u:r:shell:s0 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
      
      Bug: 26219114
      Change-Id: I862b40a6514bffaa455dd7f06368acf9bcdc4782
      cee72924
    • Jeff Vander Stoep's avatar
      app: remove permission to execute gpu_device · 1911c27f
      Jeff Vander Stoep authored
      Not actually needed as demonstrated by the auditallow rule.
      
      Change-Id: Ia92c82ec237ab3490a1d51fa3371778e43e09504
      1911c27f
    • Bertrand SIMONNET's avatar
      Allows init to send signals. · 34e4da5f
      Bertrand SIMONNET authored
      This will allow init to terminate services cleanly (SIGTERM, wait,
      SIGKILL) when needed.
      
      Bug: 26216447
      Test: manual: init is able to send a SIGTERM signal without denials.
      
      Change-Id: Id2471ca08c0b011be64a36956628e965bc999bc6
      34e4da5f
    • Nick Kralevich's avatar
      Remove cache_recovery_file symlink read · dc37ea73
      Nick Kralevich authored
      auditallow shows no hits.
      
      Change-Id: I5ae33d34cd4bfa48f4384926fcafd84bec60e899
      dc37ea73
  3. Jan 06, 2016
  4. Jan 05, 2016
  5. Jan 04, 2016
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
    • dcashman's avatar
      Create sysfs_zram label. · 36f255ff
      dcashman authored
      Address following denials:
      avc: denied { getattr } for path="/sys/devices/virtual/block/zram0/disksize" dev="sysfs" ino=14958 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { search } for name="zram0" dev="sysfs" ino=14903 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { read } for name="mem_used_total" dev="sysfs" ino=14970 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { write } for name="uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { open } for path="/sys/devices/virtual/block/zram0/uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { read } for pid=348 comm="vold" name="zram0" dev="sysfs" ino=15223 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { search } for pid=3494 comm="ContactsProvide" name="zram0"dev="sysfs" ino=15223 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      
      Bug: 22032619
      Change-Id: I40cf918b7cafdba6cb3d42b04b1616a84e4ce158
      36f255ff
  6. Dec 29, 2015
  7. Dec 24, 2015
    • Daichi Hirono's avatar
      Add new rules for appfuse. · a20802dd
      Daichi Hirono authored
      The new rules are used to allow to mount FUSE file system for priv-app.
      
      Change-Id: I5ce2d261be501e2b3fef09b7666f1e5d1cddbe52
      a20802dd
  8. Dec 23, 2015
    • Mark Salyzyn's avatar
      7fbab483
    • Mark Salyzyn's avatar
      Settings: Add option to disable logging · 8179eb81
      Mark Salyzyn authored
      Bug: 26178938
      Change-Id: I07eebf9f3854aa447950909b6e97a565b2846644
      8179eb81
    • Nick Kralevich's avatar
      undeprecate /proc/cpuinfo, more shell permissions · f8f937a1
      Nick Kralevich authored
      Access to /proc/cpuinfo was moved to domain_deprecated in commit
      6e3506e1. Restore access to everyone.
      
      Allow the shell user to stat() /dev, and vfsstat() /proc and other
      labeled filesystems such as /system and /data.
      
      Access to /proc/cpuinfo was explicitly granted to bootanim, but is no
      longer required after moving it back to domain.te. Delete the redundant
      entry.
      
      Commit 4e2d2245 restored access to
      /sys/devices/system/cpu for all domains, but forgot to remove the
      redundant entry from bootanim.te. Cleanup the redundant entry.
      
      Addresses the following denials:
      
        avc: denied { getattr } for pid=23648 comm="bionic-unit-tes" name="/" dev="proc" ino=1 scontext=u:r:shell:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
        avc: denied { read } for name="cpuinfo" dev="proc" ino=4026533615 scontext=u:r:shell:s0 tcontext=u:object_r:proc_cpuinfo:s0 tclass=file permissive=0
        avc: denied { getattr } for pid=23713 comm="bionic-unit-tes" path="/dev" dev="tmpfs" ino=11405 scontext=u:r:shell:s0 tcontext=u:object_r:device:s0 tclass=dir permissive=0
        avc: denied { getattr } for name="/" dev="mmcblk0p30" ino=2 scontext=u:r:shell:s0 tcontext=u:object_r:labeledfs:s0 tclass=filesystem permissive=0
      
      Bug: 26295417
      Change-Id: Ia85ac91cbd43235c0f8fe0aebafffb8046cc77ec
      f8f937a1
  9. Dec 22, 2015
  10. Dec 18, 2015
    • Nick Kralevich's avatar
      neverallow debugfs access · 96b1c9ca
      Nick Kralevich authored
      Don't allow access to the generic debugfs label. Instead, force
      relabeling to a more specific type. system_server and dumpstate
      are excluded from this until I have time to fix them.
      
      Tighten up the neverallow rules for untrusted_app. It should never
      be reading any file on /sys/kernel/debug, regardless of the label.
      
      Change-Id: Ic7feff9ba3aca450f1e0b6f253f0b56c7918d0fa
      96b1c9ca
  11. Dec 17, 2015
    • Nick Kralevich's avatar
      Revert "fingerprintd.te: neverallow fingerprint data file access" · cf7ee8a8
      Nick Kralevich authored
      Both angler and bullhead violate these SELinux rules.
      
      Bullhead: tee has access to these files
      Angler: system_server has read/write access to these files.
      
      Fixes the following compile time error:
      
        libsepol.report_failure: neverallow on line 32 of external/sepolicy/fingerprintd.te (or line 6704 of policy.conf) violated by allow tee fingerprintd_data_file:file { ioctl read write create setattr lock append rename open };
        libsepol.check_assertions: 1 neverallow failures occurred
        Error while expanding policy
        out/host/linux-x86/bin/checkpolicy:  loading policy configuration from out/target/product/bullhead/obj/ETC/sepolicy_intermediates/policy.conf
      
      This reverts commit 604a8cae.
      
      Change-Id: Iabb8f2e9de96f9082cd6a790d1af80cbc6a569b1
      cf7ee8a8
    • Nick Kralevich's avatar
      fingerprintd.te: neverallow fingerprint data file access · 604a8cae
      Nick Kralevich authored
      Only fingerprintd should be creating/reading/writing/etc from
      /data/system/users/[0-9]+/fpdata(/.*)? . Add a neverallow rule
      (compile time assertion + CTS test) to ensure no regressions.
      
      Change-Id: I30261a4bd880f5c4f3d90d1686a6267f60bdd413
      604a8cae
    • Amith Yamasani's avatar
      Add policies for system_server to delete fpdata folder · 107c5539
      Amith Yamasani authored
      Bug: 26211308
      Change-Id: I8fd2d14ea52d49a33e6cdbcdf90630eea89f7dd0
      107c5539
  12. Dec 16, 2015
    • William Roberts's avatar
      sectxfile_nl: fix superfluous dependencies · cb1ab985
      William Roberts authored
      
      The target sectxfile_nl, which is an auto-generated newline file,
      has dependencies on itself and the other files. The dependencies
      should be on the other files and this newline file, not the other
      way around. Ideally, the *_contexts recipes should have the
      dependency recorded for their "contexts" files and the newline
      file.
      
      Additionally, recipe dependencies for building the *_contexts files
      depended on the list of all the contexts files with the newline file
      in that list, however an additional explicit addition of the newline
      file was also added in. Remove this, since its in the full list of
      files.
      
      Change-Id: Iac658923f23a8d9263d392c44003b6bda4064646
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      cb1ab985
    • Nick Kralevich's avatar
      init.te: allow writing to /sys/kernel/debug/tracing/tracing_on · 5beeb81e
      Nick Kralevich authored
      Needed to disable tracing. See frameworks/native/cmds/atrace/atrace.rc
      
      Also allow shell getattr access to the tracing file. That way
      "ls -la" returns something meaningful.
      
      Bug: 26217098
      Change-Id: I4eee1aff1127db8945612133c8ae16c34cfbb786
      5beeb81e
    • Jeffrey Vander Stoep's avatar
      d48773ab
  13. Dec 15, 2015
  14. Dec 14, 2015
    • William Roberts's avatar
      checkfc: add attribute test · ad3cb39e
      William Roberts authored
      
      Enable checkfc to check *_contexts against a set of valid attributes
      which must be associated with all types in the contexts file that
      is being checked.
      
      Since it's imperative that checkfc knows which file its checking to
      choose the proper attribute set, the -s option is introduced to
      indicate the service_contexts file. The property_contexts file continues
      to use the existing -p and file_contexts requires no specification, aka
      it's the default.
      
      Failure examples:
      file_contexts:
      Error: type "init" is not of set: "fs_type, dev_type, file_type"
      
      service_contexts:
      Error: type "init_exec" is not of set: "service_manager_type"
      
      property_contexts:
      Error: type "bluetooth_service" is not of set: "property_type"
      
      Change-Id: I62077e4d0760858a9459e753e14dfd209868080f
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      ad3cb39e
    • Nick Kralevich's avatar
      label /sys/kernel/debug/tracing and remove debugfs write · fe12b616
      Nick Kralevich authored
      Start labeling the directory /sys/kernel/debug/tracing. The files
      in this directory need to be writable to the shell user.
      
      Remove global debugfs:file write access. This was added in the days
      before we could label individual debugfs files.
      
      Change-Id: I79c1fcb63b4b9b903dcabd99b6b25e201fe540a3
      fe12b616
    • Mark Salyzyn's avatar
      Merge "dumpstate: storage statistics" · a9bf9954
      Mark Salyzyn authored
      a9bf9954
Loading