Skip to content
Snippets Groups Projects
  1. Jan 27, 2016
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
    • Daniel Cashman's avatar
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      vold: grant perms from domain_deprecated · 9306072c
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: denied { open } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: denied { getattr } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      
      avc: denied { read } for name="/" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      avc: denied { open } for path="/cache" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      avc: denied { ioctl } for path="/cache" dev="mmcblk0p30" ino=2 ioctlcmd=5879 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      
      avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir
      avc: denied { open } for path="/proc" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir
      
      avc: denied { read } for name="psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: I8af7edc5b06675a9a2d62bf86e1c22dbb5d74370
      avc: denied { read } for name="block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
      avc: denied { open } for path="/sys/block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
      9306072c
    • Jeff Vander Stoep's avatar
      healthd: grant perms from domain_deprecated · 12401b8d
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      avc: denied { open } for path="/sys/devices/platform/htc_battery_max17050.8/power_supply/flounder-battery/present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: Iaee5b79a45aedad98e08c670addbf444c984165e
      12401b8d
    • Jeff Vander Stoep's avatar
      zygote: grant perms from domain_deprecated · cee6a0e7
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: Ie94d3db3c5dccb8077ef5da26221a6413f5d19c2
      cee6a0e7
    • dcashman's avatar
      Allow sdcardd tmpfs read access. · db559a34
      dcashman authored
      Address the following denial:
      type=1400 audit(1453854842.899:7): avc: denied { search } for pid=1512 comm="sdcard" name="/" dev="tmpfs" ino=7547 scontext=u:r:sdcardd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0
      
      vold: EmulatedVolume calls sdcard to mount on /storage/emulated.
      
      Bug: 26807309
      Change-Id: Ifdd7c356589f95165bba489dd06282a4087e9aee
      db559a34
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
      Revert "zygote: grant perms from domain_deprecated" · b898360e
      Jeffrey Vander Stoep authored
      This reverts commit e52fff83.
      
      Change-Id: Ieafb5214940585d63ff6f0b4802d8c7d1c126174
      b898360e
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      zygote: grant perms from domain_deprecated · e52fff83
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: I5b505ad386a445113bc0a1bb35d4f88f7761c048
      e52fff83
    • Narayan Kamath's avatar
    • Narayan Kamath's avatar
      Revert "Remove domain_deprecated from sdcard domains" · f4d7eef7
      Narayan Kamath authored
      This reverts commit 0c7bc58e.
      
      bug: 26807309
      
      Change-Id: I8a7b0e56a0d6f723508d0fddceffdff76eb0459a
      f4d7eef7
    • Jeff Vander Stoep's avatar
      domain: grant write perms to cgroups · be0616ba
      Jeff Vander Stoep authored
      Was moved to domain_deprecated. Move back to domain.
      
      Files in /acct/uid/*/tasks are well protected by unix permissions.
      No information is leaked with write perms.
      
      Change-Id: I8017e906950cba41ce350bc0892a36269ade8d53
      be0616ba
    • dcashman's avatar
      Restore untrusted_app proc_net access. · 5833e3f5
      dcashman authored
      Address the following denial:
      type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0
      
      Bug: 26806629
      Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
      5833e3f5
  2. Jan 26, 2016
  3. Jan 25, 2016
  4. Jan 23, 2016
    • Nick Kralevich's avatar
      app.te: grant /system dir/file/symlink read · 5c8854ab
      Nick Kralevich authored
      Renderscript needs the ability to read directories on
      /system. Allow it and file/symlink read access.
      
      Addresses the following denials:
        RenderScript: Invoking /system/bin/ld.mc with args '/system/bin/ld.mc -shared -nostdlib
          /system/lib64/libcompiler_rt.so -mtriple=aarch64-none-linux-gnueabi
          --library-path=/system/vendor/lib64 --library-path=/system/lib64
          -lRSDriver -lm -lc
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/primitives.o
          -o
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/librs.primitives.so'
        ld.mc   : type=1400 audit(0.0:1340): avc: denied { read } for name="lib64" dev="mmcblk0p24" ino=212 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        ld.mc   : type=1400 audit(0.0:1341): avc: denied { read } for name="lib64" dev="mmcblk0p29" ino=1187 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        RenderScript: Child process "/system/bin/ld.mc" terminated with status 256
      
      Change-Id: I9fb989f66975ed553dbc0c49e9c5b5e5bc45b3c3
      5c8854ab
  5. Jan 22, 2016
    • dcashman's avatar
      Remove domain_deprecated from untrusted_app. · cbf7ba18
      dcashman authored
      Bug: 22032619
      Change-Id: Iaa192f98df3128da5e11ce1fd3cf9d1a597fedf5
      cbf7ba18
    • dcashman's avatar
      Temporarily allow untrusted_app to read proc files. · 2193f766
      dcashman authored
      Address the following denial:
      01-22 09:15:53.998  5325  5325 W ChildProcessMai: type=1400 audit(0.0:44): avc: denied { read } for name="meminfo" dev="proc" ino=4026535444 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0
      
      Change-Id: Id2db5ba09dc9de58e6da7c213d4aa4657c6e655c
      2193f766
    • James Hawkins's avatar
    • dcashman's avatar
      Allow access to /dev/ion and proc_net dir. · 8666bf25
      dcashman authored
      Address the following:
      01-21 13:35:41.147  5896  5896 W ndroid.music:ui: type=1400 audit(0.0:22): avc: denied { read } for name="ion" dev="tmpfs" ino=1237 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0
      01-21 13:35:41.152  5896  5896 E qdmemalloc: open_device: Failed to open ion device - Permission denied
      01-21 13:35:41.152  5896  5896 E qdgralloc: Could not mmap handle 0x7f827d7260, fd=55 (Permission denied)
      01-21 13:35:41.152  5896  5896 E qdgralloc: gralloc_register_buffer: gralloc_map failed
      
      and
      
      01-22 08:58:47.667  7572  7572 W Thread-23: type=1400 audit(0.0:186): avc: denied { search } for name="xt_qtaguid" dev="proc" ino=4026535741 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=dir permissive=0
      01-22 08:58:47.671  7498  7572 I qtaguid : Untagging socket 68 failed errno=-13
      01-22 08:58:47.671  7498  7572 W NetworkManagementSocketTagger: untagSocket(68) failed with errno -13
      
      Change-Id: Id4e253879fe0f6daadd04d148a257a10add68d38
      8666bf25
    • James Hawkins's avatar
      bootstat: Implement the SELinux policy to allow reading/writing to · 39c198ac
      James Hawkins authored
      /data/misc/bootstat.
      
      BUG: 21724738
      Change-Id: I2789f57cc8182af1a7c33672ef82297f32f54e2e
      39c198ac
    • Jeffrey Vander Stoep's avatar
      e1224de0
    • Jeff Vander Stoep's avatar
      Remove domain_deprecated from sdcard domains · 0c7bc58e
      Jeff Vander Stoep authored
      Remove from blkid, blkid_untrusted, fsck, fsck_untrusted, sdcardd and
      sgdisk.
      
      Tested by adding external sdcard with and without
      "adb shell sm set-force-adoptable true" command.
      
      Address the following denials:
      avc: denied { read } for name="swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { read } for name="filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Change-Id: I097e2ba5205e43f8ee613dae063f773a35ce3d73
      0c7bc58e
  6. Jan 21, 2016
Loading