Skip to content
Snippets Groups Projects
  1. Jan 16, 2016
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      vold.te: drop allow vold toolbox_exec:file rx_file_perms; · 2309ef8f
      Nick Kralevich authored
      auditallow says not needed.
      
      Change-Id: Iafa048377e159ca3c7cc1f31653002c41ef9ef2b
      2309ef8f
    • Nick Kralevich's avatar
      priv_app.te: drop auditallows on cache_recovery_file · b8d794a1
      Nick Kralevich authored
      This is actually used. Addresses the following SELinux audit logs:
      
        avc: granted { create } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { add_name } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
        avc: granted { write } for comm="Thread-157" path="/cache/recovery/uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { write } for comm="Thread-157" path="/cache/recovery/command" dev="mmcblk0p38" ino=23 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { setattr } for comm="Thread-157" name="uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
      
      Change-Id: Idab00ebc8eacd7d8bb793b9342249227f91986a1
      b8d794a1
    • Nick Kralevich's avatar
      kernel.te: drop allow kernel untrusted_app:fd use; · 52e9d047
      Nick Kralevich authored
      auditallow says it's not used.
      
      Bug: 25331459
      Change-Id: Ic414efcd0a3be6d744ab66382c20f0ea4c9ea116
      52e9d047
  2. Jan 15, 2016
  3. Jan 14, 2016
    • Jeffrey Vander Stoep's avatar
      5de7574a
    • Jeffrey Vander Stoep's avatar
      Revert "fc_sort: initial commit" · b1fb7e40
      Jeffrey Vander Stoep authored
      Breaks builds with no device specific policy.
      
      Bug: 26568553
      This reverts commit 29d14688.
      
      Change-Id: If9254d4ad3f104a96325beedebc05dd22664084a
      b1fb7e40
    • William Roberts's avatar
      fc_sort: add NOTICE file · c68a277f
      William Roberts authored
      
      Change-Id: I0e63f90cafc5b1ca9cc112e852e172046b16a17e
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      c68a277f
    • Jeffrey Vander Stoep's avatar
      Merge "fc_sort: initial commit" · 2dea4525
      Jeffrey Vander Stoep authored
      2dea4525
    • Nick Kralevich's avatar
      drop dhcp auditallow · c29b2fc4
      Nick Kralevich authored
      toolbox_exec is executed by dhcpcd-run-hooks.
      
      Addresses the following auditallow log spam:
      
        avc: granted { read open } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read } for comm="setprop" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute } for comm="dhcpcd-run-hook" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute_no_trans } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read execute } for comm="setprop" path="/system/bin/toybox" dev="dm-0" ino=639 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
      
      Change-Id: Ib83c291961a5573397830032a67a2f6861ae2e71
      c29b2fc4
  4. Jan 13, 2016
  5. Jan 12, 2016
  6. Jan 11, 2016
    • Tom Cherry's avatar
      Remove special case handling of "ro." properties · f89847a9
      Tom Cherry authored
      Currently, properties that begin with "ro." are special cased to skip
      over the "ro." part of the prefix before matching with entries in
      property_contexts.  A change to init is removing this special case and
      therefore, the "ro." prefixes must be explicitly added to
      property_contexts.
      
      Bug 26425619
      
      Change-Id: I343f139a39abef99924e84e0d27699284f335d63
      f89847a9
  7. Jan 08, 2016
  8. Jan 07, 2016
    • Nick Kralevich's avatar
      su.te: drop domain_deprecated and app auditallow rules. · 0af2aa0b
      Nick Kralevich authored
      su is in permissive all the time. We don't want SELinux log
      spam from this domain.
      
      Addresses the following logspam:
      
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/graphics/fb0/vsync_event" dev="sysfs" ino=10815 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/thermal/thermal_zone2/temp" dev="sysfs" ino=15368 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { read } for comm="sh" name="emmc_therm" dev="sysfs" ino=17583 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: I8e17d3814e41b497b25ce00cd72698f0d22b3ab0
      0af2aa0b
    • dcashman's avatar
      Allow domain to read symlinks in /sys. · cee72924
      dcashman authored
      Address the following denial:
      avc: denied { read } for name="battery" dev="sysfs" ino=17945 scontext=u:r:shell:s0 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
      
      Bug: 26219114
      Change-Id: I862b40a6514bffaa455dd7f06368acf9bcdc4782
      cee72924
    • Jeff Vander Stoep's avatar
      app: remove permission to execute gpu_device · 1911c27f
      Jeff Vander Stoep authored
      Not actually needed as demonstrated by the auditallow rule.
      
      Change-Id: Ia92c82ec237ab3490a1d51fa3371778e43e09504
      1911c27f
    • Bertrand SIMONNET's avatar
      Allows init to send signals. · 34e4da5f
      Bertrand SIMONNET authored
      This will allow init to terminate services cleanly (SIGTERM, wait,
      SIGKILL) when needed.
      
      Bug: 26216447
      Test: manual: init is able to send a SIGTERM signal without denials.
      
      Change-Id: Id2471ca08c0b011be64a36956628e965bc999bc6
      34e4da5f
    • Nick Kralevich's avatar
      Remove cache_recovery_file symlink read · dc37ea73
      Nick Kralevich authored
      auditallow shows no hits.
      
      Change-Id: I5ae33d34cd4bfa48f4384926fcafd84bec60e899
      dc37ea73
    • William Roberts's avatar
      fc_sort: initial commit · 29d14688
      William Roberts authored
      
      Ordering matters in fc files; the last match wins. In builds where
      many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
      increasingly important in order to maintain a cohesive built
      file_contexts.
      
      To correct this, we sort the device specific file_contexts entries
      with the upstream fc_sort tool.
      
      Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      29d14688
  9. Jan 06, 2016
Loading