Skip to content
Snippets Groups Projects
  1. Apr 16, 2018
    • Joel Galenson's avatar
      Let vold_prepare_subdirs completely clean deleted user data. · 254a872c
      Joel Galenson authored
      After adding a new user, deleting it, and rebooting, some of the user's data still remained.  This adds the SELinux permissions necessary to remove all of the data.  It fixes the followign denials:
      
      avc: denied { rmdir } for scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { unlink } for scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 74866238
      Test: Create user, delete user, reboot user, see no denials or
      leftover data.
      
      Change-Id: Ibc43bd2552b388a9708bf781b5ad206f21df62dc
      254a872c
    • Treehugger Robot's avatar
      Merge "Add sepolicy for radio sap 1.2" · e96766dc
      Treehugger Robot authored
      e96766dc
    • Treehugger Robot's avatar
      e1ee3535
    • sqian's avatar
      Add sepolicy for radio sap 1.2 · b951e733
      sqian authored
      Bug: 74114758
      Test: Checked radio-service and sap-service is on the lshal after running the service
      Change-Id: I1b18711286e000a7d17664e7d3a2045aeeb8c285
      Merged-In: I1b18711286e000a7d17664e7d3a2045aeeb8c285
      (cherry picked from commit 64839e87)
      b951e733
    • Joel Galenson's avatar
      Add bug_map entries for bugs we've seen. · f55786cf
      Joel Galenson authored
      This adds numerous bug_map entries to try to annotate all denials
      we've seen.
      
      Bug: 78117980
      Test: Build
      Change-Id: I1da0690e0b4b0a44d673a54123a0b49a0d115a49
      f55786cf
    • Jaekyun Seok's avatar
      Allow dumpstate to read property_type · 4de238e9
      Jaekyun Seok authored
      dumpstate needs to read all the system properties for debugging.
      
      Bug: 77277669
      Test: succeeded building and tested with taimen
      Change-Id: I3603854b3be67d4fc55d74f7925a21bfa59c81ee
      4de238e9
  2. Apr 13, 2018
    • Jeff Sharkey's avatar
    • Treehugger Robot's avatar
      6b1ce73e
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      whitelist test failure that bypassed presubmit · 4c402df7
      Jeff Vander Stoep authored
      avc: denied { read } for comm="batterystats-wo" name="show_stat" dev="sysfs"
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Bug: 77816522
      Test: build
      Change-Id: I50a9bfe1a9e4df9c84cf4b2b4aedbb8f82ac94cd
      (cherry picked from commit 2ccd99a5)
      4c402df7
    • Suren Baghdasaryan's avatar
      Selinux: Give lmkd read access to /proc/meminfo · 76384b3e
      Suren Baghdasaryan authored
      
      Allow lmkd read access to /proc/meminfo for retrieving information
      on memory state.
      
      Change-Id: I7cf685813a5a49893c8f9a6ac4b5f6619f3c18aa
      Signed-off-by: default avatarSuren Baghdasaryan <surenb@google.com>
      76384b3e
    • Jeff Vander Stoep's avatar
      tombstoned: allow unlinking anr files · eb8f938f
      Jeff Vander Stoep authored
      Tombstoned unlinks "trace_XX" files if there are too many of them.
      
      avc: denied { unlink } for comm="tombstoned" name="trace_12"
      scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0
      tclass=file
      
      Bug: 77970585
      Test: Build/boot taimen. adb root; sigquit an app.
      Change-Id: I2c7cf81a837d82c4960c4c666b38cd910885d78d
      eb8f938f
    • Treehugger Robot's avatar
      bf41ff48
    • Jeff Sharkey's avatar
      Add exFAT support; unify behind "sdcard_type". · 000cafc7
      Jeff Sharkey authored
      We're adding support for OEMs to ship exFAT, which behaves identical
      to vfat.  Some rules have been manually enumerating labels related
      to these "public" volumes, so unify them all behind "sdcard_type".
      
      Test: atest
      Bug: 67822822
      Change-Id: I09157fd1fc666ec5d98082c6e2cefce7c8d3ae56
      000cafc7
    • Chia-I Wu's avatar
      Make persist.sys.sf.native_mode an integer · 9047a4de
      Chia-I Wu authored
      This allows for more native modes.
      
      Bug: 73824924
      Test: adb shell setprop persist.sys.sf.native_mode 2
      Change-Id: Iffdeadc8dc260de4b0c7f2b46aab08d64d25e3b1
      9047a4de
    • Joel Galenson's avatar
      Allow some vold_prepare_subdirs denials. · fc870ce9
      Joel Galenson authored
      This addresses the following denials:
      
      avc: denied { fowner } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=file
      avc: denied { relabelfrom } for comm="vold_prepare_su" name="storaged" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 77875245
      Test: Boot device.
      Test: Mislabel directories used by vold_prepare_subdirs, reboot, and
      ensure it can relabel them without denials.
      Test: Add user, reboot, delete user, reboot, observe no denials.
      
      (cherry picked from commit 855dd5a8562494f78f99e5bd5096f617ac70438f)
      
      Merged-In: Id67bc99f151a6ccb9619bbfb7080452956405121
      Change-Id: I2f6b5abfaf81570d03a30f2edf7296b5afd10c9b
      fc870ce9
    • Tom Cherry's avatar
      Allow vendor_init to write to misc_block_device · db465285
      Tom Cherry authored
      Vendors may use this to write custom messages to their bootloader, and
      as the bootloader is under vendor control, this makes sense to allow.
      
      Bug: 77881566
      Test: build
      Change-Id: I78f80400e5f386cad1327a9209ee1afc8e334e56
      db465285
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · 224921d1
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      224921d1
  3. Apr 12, 2018
  4. Apr 11, 2018
    • Jeff Vander Stoep's avatar
      hal_tetheroffload: move hwservice mapping to core policy · c41f5b84
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { find } for
      interface=android.hardware.tetheroffload.config::IOffloadConfig
      scontext=u:r:system_server:s0
      tcontext=u:object_r:default_android_hwservice:s0
      tclass=hwservice_manager
      
      Bug: 77855688
      Test: build/boot Sailfish, turn on tethering, no selinux denial
      Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
      (cherry picked from commit 3a346ea7)
      c41f5b84
    • Treehugger Robot's avatar
      Merge changes If2413c30,Ic5d7c961 · 45b4704e
      Treehugger Robot authored
      * changes:
        Suppress spurious denial
        Suppress spurious denial
      45b4704e
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · 7e5ec2bc
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } scontext=u:r:zygote:s0
      tcontext=u:r:zygote:s0 tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: If2413c3005df02a70661464d695211acbcda4094
      (cherry picked from commit 816e744d998cb327fbd20f3124b22398bea2b8e4)
      7e5ec2bc
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · f7a7f7d1
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } for comm="ip6tables" capability=24
      scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0
      tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c
      (cherry picked from commit 443a43c9)
      f7a7f7d1
    • Treehugger Robot's avatar
      be79c7b2
  5. Apr 10, 2018
    • Treehugger Robot's avatar
      6cdc9a82
    • Jeff Vander Stoep's avatar
      priv_app: remove more logspam · 9dc1d538
      Jeff Vander Stoep authored
      avc: denied { read } for name="ext4" dev="sysfs" ino=32709
      scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0
      tclass=dir permissive=0 b/72749888
      avc: denied { read } for name="state" dev="sysfs" ino=51318
      scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:sysfs_android_usb:s0 tclass=file permissive=0
      b/72749888
      
      Bug: 72749888
      Test: build/boot taimen-userdebug. No more logspam
      Change-Id: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      Merged-In: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      (cherry picked from commit 558cdf1e)
      9dc1d538
    • Treehugger Robot's avatar
      Merge "Widen crash_dump dontaudit." · 354a2530
      Treehugger Robot authored
      354a2530
    • Tri Vo's avatar
      Add internal types to 27.0[.ignore].cil. · fad493bf
      Tri Vo authored
      Bug: 69390067
      Test: manual run of treble_sepolicy_tests
      Change-Id: I1b772a3f7c96875765c75bfc1031f249411c3338
      Merged-In: I1b772a3f7c96875765c75bfc1031f249411c3338
      (cherry picked from commit 9fbd6520)
      fad493bf
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · bf4afae1
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      bf4afae1
    • Florian Mayer's avatar
    • Florian Mayer's avatar
      Expose filesystem read events in SELinux policy. · 7ad383f1
      Florian Mayer authored
      Without this, we only have visibility into writes.
      
      Looking at traces, we realised for many of the files we care about (.dex, .apk)
      most filesystem events are actually reads.
      
      See aosp/661782 for matching filesystem permission change.
      
      Bug: 73625480
      
      Change-Id: I6ec71d82fad8f4679c7b7d38e3cb90aff0b9e298
      7ad383f1
    • Joel Galenson's avatar
      Widen crash_dump dontaudit. · a3b3bdbb
      Joel Galenson authored
      We have seen crash_dump denials for radio_data_file,
      shared_relro_file, shell_data_file, and vendor_app_file.  This commit
      widens an existing dontaudit to include them as well as others that we
      might see.
      
      Test: Boot device.
      Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
      a3b3bdbb
  6. Apr 09, 2018
Loading