Skip to content
Snippets Groups Projects
  1. Apr 16, 2018
    • Jaekyun Seok's avatar
      Allow dumpstate to read property_type · 4de238e9
      Jaekyun Seok authored
      dumpstate needs to read all the system properties for debugging.
      
      Bug: 77277669
      Test: succeeded building and tested with taimen
      Change-Id: I3603854b3be67d4fc55d74f7925a21bfa59c81ee
      4de238e9
  2. Apr 13, 2018
    • Jeff Sharkey's avatar
    • Treehugger Robot's avatar
      6b1ce73e
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      whitelist test failure that bypassed presubmit · 4c402df7
      Jeff Vander Stoep authored
      avc: denied { read } for comm="batterystats-wo" name="show_stat" dev="sysfs"
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Bug: 77816522
      Test: build
      Change-Id: I50a9bfe1a9e4df9c84cf4b2b4aedbb8f82ac94cd
      (cherry picked from commit 2ccd99a5)
      4c402df7
    • Suren Baghdasaryan's avatar
      Selinux: Give lmkd read access to /proc/meminfo · 76384b3e
      Suren Baghdasaryan authored
      
      Allow lmkd read access to /proc/meminfo for retrieving information
      on memory state.
      
      Change-Id: I7cf685813a5a49893c8f9a6ac4b5f6619f3c18aa
      Signed-off-by: default avatarSuren Baghdasaryan <surenb@google.com>
      76384b3e
    • Jeff Vander Stoep's avatar
      tombstoned: allow unlinking anr files · eb8f938f
      Jeff Vander Stoep authored
      Tombstoned unlinks "trace_XX" files if there are too many of them.
      
      avc: denied { unlink } for comm="tombstoned" name="trace_12"
      scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0
      tclass=file
      
      Bug: 77970585
      Test: Build/boot taimen. adb root; sigquit an app.
      Change-Id: I2c7cf81a837d82c4960c4c666b38cd910885d78d
      eb8f938f
    • Treehugger Robot's avatar
      bf41ff48
    • Jeff Sharkey's avatar
      Add exFAT support; unify behind "sdcard_type". · 000cafc7
      Jeff Sharkey authored
      We're adding support for OEMs to ship exFAT, which behaves identical
      to vfat.  Some rules have been manually enumerating labels related
      to these "public" volumes, so unify them all behind "sdcard_type".
      
      Test: atest
      Bug: 67822822
      Change-Id: I09157fd1fc666ec5d98082c6e2cefce7c8d3ae56
      000cafc7
    • Chia-I Wu's avatar
      Make persist.sys.sf.native_mode an integer · 9047a4de
      Chia-I Wu authored
      This allows for more native modes.
      
      Bug: 73824924
      Test: adb shell setprop persist.sys.sf.native_mode 2
      Change-Id: Iffdeadc8dc260de4b0c7f2b46aab08d64d25e3b1
      9047a4de
    • Joel Galenson's avatar
      Allow some vold_prepare_subdirs denials. · fc870ce9
      Joel Galenson authored
      This addresses the following denials:
      
      avc: denied { fowner } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=file
      avc: denied { relabelfrom } for comm="vold_prepare_su" name="storaged" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 77875245
      Test: Boot device.
      Test: Mislabel directories used by vold_prepare_subdirs, reboot, and
      ensure it can relabel them without denials.
      Test: Add user, reboot, delete user, reboot, observe no denials.
      
      (cherry picked from commit 855dd5a8562494f78f99e5bd5096f617ac70438f)
      
      Merged-In: Id67bc99f151a6ccb9619bbfb7080452956405121
      Change-Id: I2f6b5abfaf81570d03a30f2edf7296b5afd10c9b
      fc870ce9
    • Tom Cherry's avatar
      Allow vendor_init to write to misc_block_device · db465285
      Tom Cherry authored
      Vendors may use this to write custom messages to their bootloader, and
      as the bootloader is under vendor control, this makes sense to allow.
      
      Bug: 77881566
      Test: build
      Change-Id: I78f80400e5f386cad1327a9209ee1afc8e334e56
      db465285
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · 224921d1
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      224921d1
  3. Apr 12, 2018
  4. Apr 11, 2018
    • Jeff Vander Stoep's avatar
      hal_tetheroffload: move hwservice mapping to core policy · c41f5b84
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { find } for
      interface=android.hardware.tetheroffload.config::IOffloadConfig
      scontext=u:r:system_server:s0
      tcontext=u:object_r:default_android_hwservice:s0
      tclass=hwservice_manager
      
      Bug: 77855688
      Test: build/boot Sailfish, turn on tethering, no selinux denial
      Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
      (cherry picked from commit 3a346ea7)
      c41f5b84
    • Treehugger Robot's avatar
      Merge changes If2413c30,Ic5d7c961 · 45b4704e
      Treehugger Robot authored
      * changes:
        Suppress spurious denial
        Suppress spurious denial
      45b4704e
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · 7e5ec2bc
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } scontext=u:r:zygote:s0
      tcontext=u:r:zygote:s0 tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: If2413c3005df02a70661464d695211acbcda4094
      (cherry picked from commit 816e744d998cb327fbd20f3124b22398bea2b8e4)
      7e5ec2bc
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · f7a7f7d1
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } for comm="ip6tables" capability=24
      scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0
      tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c
      (cherry picked from commit 443a43c9)
      f7a7f7d1
    • Treehugger Robot's avatar
      be79c7b2
  5. Apr 10, 2018
    • Treehugger Robot's avatar
      6cdc9a82
    • Jeff Vander Stoep's avatar
      priv_app: remove more logspam · 9dc1d538
      Jeff Vander Stoep authored
      avc: denied { read } for name="ext4" dev="sysfs" ino=32709
      scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0
      tclass=dir permissive=0 b/72749888
      avc: denied { read } for name="state" dev="sysfs" ino=51318
      scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:sysfs_android_usb:s0 tclass=file permissive=0
      b/72749888
      
      Bug: 72749888
      Test: build/boot taimen-userdebug. No more logspam
      Change-Id: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      Merged-In: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      (cherry picked from commit 558cdf1e)
      9dc1d538
    • Treehugger Robot's avatar
      Merge "Widen crash_dump dontaudit." · 354a2530
      Treehugger Robot authored
      354a2530
    • Tri Vo's avatar
      Add internal types to 27.0[.ignore].cil. · fad493bf
      Tri Vo authored
      Bug: 69390067
      Test: manual run of treble_sepolicy_tests
      Change-Id: I1b772a3f7c96875765c75bfc1031f249411c3338
      Merged-In: I1b772a3f7c96875765c75bfc1031f249411c3338
      (cherry picked from commit 9fbd6520)
      fad493bf
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · bf4afae1
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      bf4afae1
    • Florian Mayer's avatar
    • Florian Mayer's avatar
      Expose filesystem read events in SELinux policy. · 7ad383f1
      Florian Mayer authored
      Without this, we only have visibility into writes.
      
      Looking at traces, we realised for many of the files we care about (.dex, .apk)
      most filesystem events are actually reads.
      
      See aosp/661782 for matching filesystem permission change.
      
      Bug: 73625480
      
      Change-Id: I6ec71d82fad8f4679c7b7d38e3cb90aff0b9e298
      7ad383f1
    • Joel Galenson's avatar
      Widen crash_dump dontaudit. · a3b3bdbb
      Joel Galenson authored
      We have seen crash_dump denials for radio_data_file,
      shared_relro_file, shell_data_file, and vendor_app_file.  This commit
      widens an existing dontaudit to include them as well as others that we
      might see.
      
      Test: Boot device.
      Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
      a3b3bdbb
  6. Apr 09, 2018
  7. Apr 06, 2018
    • Mikhail Naganov's avatar
      Add shell:fifo_file permission for audioserver · 05e12dba
      Mikhail Naganov authored
      Bug: 73405145
      Test: cts-tradefed run cts -m CtsMediaTestCases -t android.media.cts.AudioRecordTest#testRecordNoDataForIdleUids
      Change-Id: I09bdb74c9ecc317ea090643635ca26165efa423a
      (cherry picked from commit c5815891)
      Merged-In: I09bdb74c9ecc317ea090643635ca26165efa423a
      05e12dba
    • Yifan Hong's avatar
      hal_health: allow to write kernel logs. · 5ef48cf8
      Yifan Hong authored
      This is originally allowed in healthd but the permission
      was not transfered to health HAL. A typical health HAL
      implementation is likely to write battery info to kernel
      logs.
      
      Test: device has battery kernel logs with health HAL
            but without healthd
      
      Bug: 77661605
      
      Change-Id: Ib3b5d3fe6bdb3df2a240c85f9d27b863153805d2
      5ef48cf8
    • Florian Mayer's avatar
      Grant traced_probes search on directories. · ff146962
      Florian Mayer authored
      This is needed to be able to scan the labels we have
      permission on.
      
      Denial:
      
      04-06 12:52:22.674   874   874 W traced_probes: type=1400 audit(0.0:10314): avc: denied { search } for name="backup" dev="sda45" ino=6422529 scontext=u:r:traced_probes:s0 tcontext=u:object_r:backup_data_file:s0 tclass=dir permissive=0
      
      Bug: 73625480
      ff146962
Loading