Skip to content
Snippets Groups Projects
  1. Jan 17, 2018
    • Jeff Vander Stoep's avatar
      Annotate denials · 1e1a3f7c
      Jeff Vander Stoep authored
      There is a race condition between when /data is mounted
      and when processes attempt to access it. Attempting to access
      /data before it's mounted causes an selinux denial. Attribute
      these denials to a bug.
      
      07-04 23:48:53.646   503   503 I auditd  : type=1400 audit(0.0:7): avc:
      denied { search } for comm="surfaceflinger" name="/" dev="sda35" ino=2
      scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      07-15 17:41:18.100   582   582 I auditd  : type=1400 audit(0.0:4): avc:
      denied { search } for comm="BootAnimation" name="/" dev="sda35" ino=2
      scontext=u:r:bootanim:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
      permissive=0
      
      Bug: 68864350
      Test: build
      Change-Id: I07f751d54b854bdc72f3e5166442a5e21b3a9bf5
      1e1a3f7c
  2. Jan 10, 2018
  3. Nov 29, 2017
    • Jeff Vander Stoep's avatar
      Fix bug map entry · 53950b65
      Jeff Vander Stoep authored
      Tclass was omitted for two entries.
      
      Bug: 69928154
      Bug: 69366875
      Test: build
      Change-Id: Ie12c240b84e365110516bcd786b98dc37295fdb9
      53950b65
  4. Nov 21, 2017
  5. Nov 14, 2017
    • Jeff Vander Stoep's avatar
      Add tracking bugs to crash_dump denials · 41401f47
      Jeff Vander Stoep authored
      avc: denied { search } for name="com.sf.activity" dev="sda35"
      ino=1444147 scontext=u:r:crash_dump:s0:c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir
      avc: denied { search } for comm="crash_dump64"
      name="com.android.bluetooth" dev="sda13" ino=1442292
      scontext=u:r:crash_dump:s0 tcontext=u:object_r:bluetooth_data_file:s0
      tclass=dir
      avc: denied { search } for comm="crash_dump64" name="overlay" dev="dm-1"
      ino=938 scontext=u:r:crash_dump:s0
      tcontext=u:object_r:vendor_overlay_file:s0 tclass=dir permissive=0
      
      Bug: 68705274
      Bug: 68319037
      Test: build
      Change-Id: I44075ac6bf6447d863373c97ba10eadf59d2d22f
      41401f47
  6. Nov 13, 2017
    • Jeff Vander Stoep's avatar
      Add tracking bugs to denials · 29666d12
      Jeff Vander Stoep authored
      These denials should not be allowed. Adding a bug number to the
      denial properly attributes them to a bug.
      
      Bug: 69197466
      avc: denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability
      
      Bug: 62140539
      avc: denied { open }
      path="/data/system_de/0/spblob/17a358cf8dff62ea.weaver"
      scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0
      tclass=file
      avc: denied { unlink } for name="17a358cf8dff62ea.weaver"
      scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0
      tclass=file
      
      Bug: 69175449
      avc: denied { read } for name="pipe-max-size" dev="proc"
      scontext=u:r:system_server:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Test: build
      Change-Id: I62dc26a9076ab90ea4d4ce1f22e9b195f33ade16
      29666d12
  7. Oct 13, 2017
Loading