- Jan 27, 2016
-
-
dcashman authored
Address the following denial: type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0 Bug: 26806629 Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
-
- Jan 26, 2016
-
-
SimHyunYong authored
r_dir_file(domain, self) allow domain self:dir r_dir_perms; allow domain self:lnk_file r_file_perms; allow domain self:file r_file_perms; te_macros define(`r_dir_file', ` allow $1 $2:dir r_dir_perms; allow $1 $2:{ file lnk_file } r_file_perms; ') Change-Id: I7338f63a1eaa8ca52cd31b51ce841e3dbe46ad4f
-
Jeffrey Vander Stoep authored
-
James Hawkins authored
-
James Hawkins authored
* Allow reading /proc. type=1400 audit(1453834004.239:7): avc: denied { read } for pid=1305 comm="bootstat" name="uptime" dev="proc" ino=4026536600 scontext=u:r:bootstat:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 * Define domain for the /system/bin/bootstat file. init: Service exec 4 (/system/bin/bootstat) does not have a SELinux domain defined. Bug: 21724738 Change-Id: I4baa2fa7466ac35a1ced79776943c07635ec9804
-
SimHyunYong authored
define(`binder_call', ` allow $1 $2:binder { call transfer }; allow $2 $1:binder transfer; allow $1 $2:fd use; ') binder_call(surfaceflinger, appdomain) binder_call(surfaceflinger, bootanim) it is alread include these policy.. so I can delete these policy! allow surfaceflinger appdomain:fd use; allow surfaceflinger bootanim:fd use;
-
Jeffrey Vander Stoep authored
-
Tao Bao authored
-
SimHyunYong authored
allow appdomain keychain_data_file:dir r_dir_perms; allow appdomain keychain_data_file:file r_file_perms;
-
Tao Bao authored
Register service with servicemanager and name the context. avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager Also allow priv_app to communicate with update_engine. avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
-
dcashman authored
Commit 2fdeab37 added ability to debug over adbd for zygote-spawned apps, required by removal of domain_deprecated from untrusted_app. This functionality is a core debugabble component of the android runtime, so it is needed by system_server as well. Bug: 26458796 Change-Id: I29f5390122b3644449a5c3dcf4db2d0e969f6a9a
-
- Jan 25, 2016
-
-
Jeff Vander Stoep authored
Permission to connect to adb was removed from untrusted_app when the domain_deprecated attribute was removed. Add it back to support debugging of apps. Grant to all apps as eventually domain_deprecated will be removed from everything. Bug: 26458796 Change-Id: I4356e6d011094cdb6829210dd0eec443b21f8496
-
Jeff Vander Stoep authored
Domain is already allowed to stat selinuxfs, it also needs dir search. Addresses: avc: denied { search } for name="/" dev="selinuxfs" ino=1 scontext=u:r:watchdogd:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir Change-Id: I3e5bb96e905db480a2727038f80315d9544e9c07
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Change-Id: I60d66da98a8da9cd7a9d0130862242e09b7dccf1
-
- Jan 23, 2016
-
-
Nick Kralevich authored
Renderscript needs the ability to read directories on /system. Allow it and file/symlink read access. Addresses the following denials: RenderScript: Invoking /system/bin/ld.mc with args '/system/bin/ld.mc -shared -nostdlib /system/lib64/libcompiler_rt.so -mtriple=aarch64-none-linux-gnueabi --library-path=/system/vendor/lib64 --library-path=/system/lib64 -lRSDriver -lm -lc /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/primitives.o -o /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/librs.primitives.so' ld.mc : type=1400 audit(0.0:1340): avc: denied { read } for name="lib64" dev="mmcblk0p24" ino=212 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 ld.mc : type=1400 audit(0.0:1341): avc: denied { read } for name="lib64" dev="mmcblk0p29" ino=1187 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 RenderScript: Child process "/system/bin/ld.mc" terminated with status 256 Change-Id: I9fb989f66975ed553dbc0c49e9c5b5e5bc45b3c3
-
- Jan 22, 2016
-
-
dcashman authored
Bug: 22032619 Change-Id: Iaa192f98df3128da5e11ce1fd3cf9d1a597fedf5
-
dcashman authored
Address the following denial: 01-22 09:15:53.998 5325 5325 W ChildProcessMai: type=1400 audit(0.0:44): avc: denied { read } for name="meminfo" dev="proc" ino=4026535444 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0 Change-Id: Id2db5ba09dc9de58e6da7c213d4aa4657c6e655c
-
James Hawkins authored
-
dcashman authored
Address the following: 01-21 13:35:41.147 5896 5896 W ndroid.music:ui: type=1400 audit(0.0:22): avc: denied { read } for name="ion" dev="tmpfs" ino=1237 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0 01-21 13:35:41.152 5896 5896 E qdmemalloc: open_device: Failed to open ion device - Permission denied 01-21 13:35:41.152 5896 5896 E qdgralloc: Could not mmap handle 0x7f827d7260, fd=55 (Permission denied) 01-21 13:35:41.152 5896 5896 E qdgralloc: gralloc_register_buffer: gralloc_map failed and 01-22 08:58:47.667 7572 7572 W Thread-23: type=1400 audit(0.0:186): avc: denied { search } for name="xt_qtaguid" dev="proc" ino=4026535741 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=dir permissive=0 01-22 08:58:47.671 7498 7572 I qtaguid : Untagging socket 68 failed errno=-13 01-22 08:58:47.671 7498 7572 W NetworkManagementSocketTagger: untagSocket(68) failed with errno -13 Change-Id: Id4e253879fe0f6daadd04d148a257a10add68d38
-
James Hawkins authored
/data/misc/bootstat. BUG: 21724738 Change-Id: I2789f57cc8182af1a7c33672ef82297f32f54e2e
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Remove from blkid, blkid_untrusted, fsck, fsck_untrusted, sdcardd and sgdisk. Tested by adding external sdcard with and without "adb shell sm set-force-adoptable true" command. Address the following denials: avc: denied { read } for name="swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file avc: denied { open } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file avc: denied { getattr } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file avc: denied { read } for name="filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file avc: denied { open } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file avc: denied { getattr } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file Change-Id: I097e2ba5205e43f8ee613dae063f773a35ce3d73
-
- Jan 21, 2016
-
-
Jeff Vander Stoep authored
Bug: 22821100 Change-Id: I549abfd31f7286ad50be3adeadaf559816c0ee38
-
Jeffrey Vander Stoep authored
-
dcashman authored
Address the following denials: 01-21 12:44:53.704 4595 4595 W ndroid.calendar: type=1400 audit(0.0:21): avc: denied { getattr } for name="/" dev="dm-0" ino=2 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:labeledfs:s0 tclass=filesystem permissive=0 01-21 12:45:23.177 5544 5544 W roid.music:main: type=1400 audit(0.0:46): avc: denied { getattr } for name="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=filesystem permissive=0 7618 W .android.chrome: type=1400 audit(0.0:413): avc: denied { getattr } for path="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=0 01-21 12:44:53.709 4595 4595 D AndroidRuntime: Shutting down VM 01-21 12:44:53.727 4595 4595 E AndroidRuntime: FATAL EXCEPTION: main 01-21 12:44:53.727 4595 4595 E AndroidRuntime: Process: com.google.android.calendar, PID: 4595 01-21 12:44:53.727 4595 4595 E AndroidRuntime: java.lang.RuntimeException: Unable to get provider com.google.android.syncadapters.calendar.timely.TimelyProvider: java.lang.IllegalArgumentException: Invalid path: /data 01-21 12:44:53.727 4595 4595 E AndroidRuntime: at android.app.ActivityThread.installProvider(ActivityThread.java:5550) ... Change-Id: I0e9d65438d031e19c9abc5dca8969ed4356437a0
-
Jeff Vander Stoep authored
In libext2fs ext2fs_check_mount_point() calls is_swap_device() to verify that a device is swap before setting the EXT2_MF_SWAP mount flag. Addresses: avc: denied { getattr } for path="/dev/block/zram0" dev="tmpfs" ino=9951 scontext=u:r:fsck:s0 tcontext=u:object_r:swap_block_device:s0 tclass=blk_file Bug: 22821100 Change-Id: Ic7a1b6f83b34a40bf4bd35a1564300c58ca27089
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Used in system/vold/MoveTask.cpp Addresses: avc: denied { execute } for name="toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 avc: denied { read open } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 avc: denied { execute_no_trans } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 Change-Id: I2eb6288aaed510ae5be0f3605088ace6b865ef83
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Only used in AOSP by flounder. No denials when running Google Maps. Change-Id: I9902c263016b4d38f1b3ed0be0bc7c4cd17ee471
-
- Jan 20, 2016
-
-
Jeff Vander Stoep authored
Strengthen neverallow rule to enforce that no apps may write to system_data_file - the default label for /data/ Change-Id: I886e4340f300551754c9e33e9c1764fb730b6b14
-
- Jan 19, 2016
-
-
Jeffrey Vander Stoep authored
-
Rubin Xu authored
-
Rubin Xu authored
They are introduced for the device owner process logging feature. That is, for enterprise-owned devices with device owner app provisioned, the device owner may choose to turn on additional device-wide logging for auditing and intrusion detection purposes. Logging includes histories of app process startup, commands issued over ADB and lockscreen unlocking attempts. These logs will available to the device owner for analysis, potentially shipped to a remote server if it chooses to. ro.device_owner will be a master switch to turn off logging, if the device has no device owner provisioned. persist.logd.security is a switch that device owner can toggle (via DevicePoliyManager) to enable/disable logging. Writing to both properties should be only allowed by the system server. Bug: 22860162 Change-Id: Iabfe2347b094914813b9d6e0c808877c25ccd038
-
- Jan 16, 2016
-
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
auditallow says not needed. Change-Id: Iafa048377e159ca3c7cc1f31653002c41ef9ef2b
-
Nick Kralevich authored
auditallow says not needed. Change-Id: If44f64aeb5d0be78fd166d1b3eee298c5f7c860d
-