Skip to content
Snippets Groups Projects
  1. Jan 02, 2018
  2. Dec 30, 2017
  3. Dec 29, 2017
  4. Dec 22, 2017
  5. Dec 21, 2017
    • Tri Vo's avatar
      system_server: search permission to all of sysfs. · ce8bc8b0
      Tri Vo authored
      This will allow system_server to perfom path resolution on paths like:
      /sys/devices/soc/800f000.qcom,spmi/spmi-0/spmi0-00/800f000.qcom,spmi:qcom,pm8998@0:qcom,pm8998_rtc/rtc
      
      Fixes this denial:
      avc: denied { search } for pid=947 comm=system_server
      name=800f000.qcom,spmi dev=sysfs ino=19891
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
      tclass=dir permissive=0 b/68003344
      
      Bug: 68003344
      Test: walleye boots without the denial above.
      Change-Id: Ib282395124c7f2f554681fcc713b9afe189f441c
      ce8bc8b0
    • Treehugger Robot's avatar
  6. Dec 20, 2017
  7. Dec 19, 2017
  8. Dec 18, 2017
    • xshu's avatar
      Wifi hal - Firmware dump permissions · 6ad3c891
      xshu authored
      we are aiming to improve logging performance by having wifi hal
      directly write to the flash.
      
      Wifi hal need to be able to create, write, and delete files in
      a directory. This will be restricted to userdebug and eng builds only.
      
      Bug: 70170285
      Test: compile, run on device
      Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
      6ad3c891
  9. Dec 16, 2017
  10. Dec 15, 2017
  11. Dec 14, 2017
    • Tri Vo's avatar
      perfprofd: allow traversing sysfs directories. · ae207915
      Tri Vo authored
      Bug: 70275668
      Test: walleye builds, boots.
      This change only expands the existing permissions, so shouldn't regress
      runtime behavior.
      Change-Id: I36e63f11d78998a88e3f8d1e6913e20762a359af
      ae207915
  12. Dec 13, 2017
  13. Dec 12, 2017
  14. Dec 11, 2017
    • Jeff Vander Stoep's avatar
      Restore recovery's ability to format cache and preserve logs · 87dd195b
      Jeff Vander Stoep authored
      Commit b8b4f5d6 'Clean up old file-based OTA SELinux rules' removed
      many permissions from recovery, a few of which are still required.
      Restore these.
      
      [ 2918.409108] type=1400 audit(2327427.540:159): avc:  denied
      { search } for  pid=339 comm="recovery" name="/" dev="mmcblk0p38"
      ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      [ 2586.563071] E:Failed to mount / create /cache/recovery: Permission
      denied
      [ 2586.780320] E:Can't open /cache/recovery/log: Permission denied
      [ 2586.850399] E:Can't open /cache/recovery/last_log: Permission
      denied
      [ 2586.918979] E:Can't open /cache/recovery/last_install: Permission
      denied
      
      [   54.035867] type=1400 audit(59206654.526:12): avc:  denied  { chown }
      for  pid=330 comm="recovery" capability=0  scontext=u:r:recovery:s0
      tcontext=u:r:recovery:s0 tclass=capability permissive=0a
      
      Bug: 70350029
      Test: xunchang to test
      Change-Id: I46ab049b8eb600b44c84a61777fade150cadd197
      87dd195b
    • Tri Vo's avatar
      Remove access to 'sysfs' files from healtd and charger. · d276b434
      Tri Vo authored
      We rely on vendors to label all dependencies of healthd/charger under
      /sys/class/power_supply with sysfs_batteryinfo type.
      
      Bug: 65643247
      Bug: 32659667
      Test: boots without denials from healthd, to sysfs_batteryinfo or to
      sysfs_msm_subsys.
      Test: charging with device turned off works without /sys denials.
      
      Change-Id: I893f309ecad8a0caf7d0b81f5f945725907255c2
      d276b434
  15. Dec 09, 2017
  16. Dec 08, 2017
  17. Dec 07, 2017
Loading