Skip to content
Snippets Groups Projects
  1. Dec 07, 2015
    • Nick Kralevich's avatar
      adbd: allow ddms screen capture to work again · 5e8402df
      Nick Kralevich authored
      The removal of domain_deprecated broke ddms screen capturing
      functionality.
      
      Steps to reproduce:
      
      1) Run "ddms"
      2) Select your device
      3) Go to the Device > Screen Capture menu
      4) Attempt to take a screenshot
      
      Addresses the following denials:
      
        avc: denied { read } for pid=2728 comm="screencap" name="ion" dev="tmpfs" ino=7255 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { open } for pid=2728 comm="screencap" name="ion" dev="tmpfs" ino=7255 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { ioctl } for pid=2728 comm="screencap" path="/dev/ion" dev="tmpfs" ino=7255 ioctlcmd=4905 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { read } for pid=5261 comm="screencap" name="egl" dev="dm-1" ino=210 scontext=u:r:adbd:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        avc: denied { read } for pid=5261 comm="screencap" name="egl" dev="dm-1" ino=210 scontext=u:r:adbd:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
      
      Bug: 26023462
      Change-Id: Ie77c65900de56756d5c9b99dcda1e20664151ed2
      5e8402df
    • Nick Kralevich's avatar
      adbd: allow "adb pull /sdcard/" · b899f4fc
      Nick Kralevich authored
      The removal of domain_deprecated broke the ability for adbd to
      pull files from /sdcard. Re-allow it.
      
      Addresses the following denials:
      
        avc: denied { search } for pid=2753 comm=73657276696365203530 name="/" dev="tmpfs" ino=6242 scontext=u:r:adbd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0
        avc: denied { getattr } for pid=2755 comm=73657276696365203431 path="/sdcard" dev="rootfs" ino=5472 scontext=u:r:adbd:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=0
      
      Change-Id: I70257933f554abd008932c7f122dd0151f464b05
      b899f4fc
  2. Dec 04, 2015
    • Felipe Leme's avatar
      Increase communication surface between dumpstate and Shell: · 83fd8a54
      Felipe Leme authored
      - Add a new 'dumpstate' context for system properties. This context
        will be used to share state between dumpstate and Shell. For example,
        as dumpstate progresses, it will update a system property, which Shell
        will use to display the progress in the UI as a system
        notification. The user could also rename the bugreport file, in which
        case Shell would use another system property to communicate such
        change to dumpstate.
      - Allow Shell to call 'ctl.bugreport stop' so the same system
        notification can be used to stop dumpstate.
      
      BUG: 25794470
      
      Change-Id: I74b80bda07292a91358f2eea9eb8444caabc5895
      83fd8a54
    • Jeffrey Vander Stoep's avatar
      f6a0b144
    • Nick Kralevich's avatar
      shell.te: Allow read access to system_file · 29b9532a
      Nick Kralevich authored
      Certain tests depend on the ability to examine directories
      in /system. Allow it to the shell user.
      
      Addresses the following denials:
      
        avc: denied { read } for name="egl" dev="dm-1" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
      
      Bug: 26020967
      Bug: 26023420
      Change-Id: I509d921e159e99164c85fae9e8b2982a47573d14
      29b9532a
    • Jeff Vander Stoep's avatar
      rild: Remove toolbox_exec perms · e811c49f
      Jeff Vander Stoep authored
      Confirmed via audit logs that it is not required.
      
      Change-Id: I01d4b7ec15d4c852a9f28daf0b40ab4bce930125
      e811c49f
    • Jeffrey Vander Stoep's avatar
      98c3f997
  3. Dec 03, 2015
  4. Dec 02, 2015
  5. Dec 01, 2015
  6. Nov 28, 2015
    • Nick Kralevich's avatar
      Remove domain_deprecated from adbd and shell · 8ca19368
      Nick Kralevich authored
      The extra permissions are not needed. Delete them.
      
      This change also adds read permission for /data/misc/zoneinfo
      back to all domains. libc refernces this directory for timezone
      related files, and it feels dangerous and of little value to
      try to restrict access. In particular, this causes problems when the
      shell user attempts to run "ls -la" to show file time stamps in
      the correct timezone.
      
      Bug: 25433265
      Change-Id: I666bb460e440515151e3bf46fe2e0ac0e7c99f46
      8ca19368
  7. Nov 25, 2015
    • Jeff Vander Stoep's avatar
      Perms back to domain · 9a3d1c6b
      Jeff Vander Stoep authored
      allow reading symlinks in /data and getattr in /system
      
      Change-Id: I8cc9ca056725cf10ebfeef474ebf9c80c5300a73
      9a3d1c6b
  8. Nov 24, 2015
  9. Nov 21, 2015
    • Sen Jiang's avatar
      Add bspatch to update_engine_exec. · d33155be
      Sen Jiang authored
      This allow bspatch to have same perssion as update_engine.
      
      Also added a rule to allow update_engine to execute bspatch.
      
      Bug: 24478450
      Test: No more permission deny during delta update.
      
      Change-Id: If94bc703b2f3fc32f901f0d7f300934316d4e9a4
      d33155be
  10. Nov 20, 2015
    • Nick Kralevich's avatar
      system_server: allow restorecon /data/system/users/0/fpdata · 4fd21606
      Nick Kralevich authored
      Addresses the following denial:
      
        avc: denied { relabelfrom } for pid=9971 comm="system_server" name="fpdata" dev="dm-0" ino=678683 scontext=u:r:system_server:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
      
      Bug: 25801240
      Change-Id: I043f48f410505acaee4bb97446945316f656a210
      4fd21606
  11. Nov 19, 2015
    • Jeff Vander Stoep's avatar
      Move some perms back to domain · aef68b77
      Jeff Vander Stoep authored
      libselinux stats selinuxfs, as does every process that links against
      libselinux such as toolbox. grant:
         allow domain selinuxfs:filesystem getattr;
      
      domain is already granted:
         allow domain self:dir r_dir_perms;
         allow domain self:lnk_file r_file_perms;
         allow domain self:{ fifo_file file } rw_file_perms;
      To make these possible, also grant:
         allow domain proc:dir search;
      
      Change-Id: Ife6cfa2124c9d61bf908ac89a8444676acdb4259
      aef68b77
  12. Nov 18, 2015
  13. Nov 17, 2015
  14. Nov 16, 2015
  15. Nov 12, 2015
  16. Nov 11, 2015
    • Calin Juravle's avatar
      Add SElinux rules for /data/misc/trace · f255d775
      Calin Juravle authored
      The directory is to be used in eng/userdebug build to store method
      traces (previously stored in /data/dalvik-cache/profiles).
      
      Bug: 25612377
      
      Change-Id: Ia4365a8d1f13d33ee54115dc5e3bf62786503993
      f255d775
  17. Nov 09, 2015
  18. Nov 07, 2015
    • Nick Kralevich's avatar
      system_server: clean up stale rules · 142f97b7
      Nick Kralevich authored
      979adffd added an auditallow
      to see if system_server was relabeling system_data_file.
      The auditallow rule hasn't triggered, so remove the allow rule.
      
      a3c97a76 added an auditallow
      to see if system_server was executing toolbox. The auditallow
      rule hasn't triggered, so remove the allow rule. AFAIK,
      system_server never executes ANY file, so further tightening here
      is feasible.
      
      Change-Id: Ia0a93f3833e32c3e2c898463bd8813701a6dd20a
      142f97b7
  19. Nov 03, 2015
    • Jeff Vander Stoep's avatar
      Create attribute for moving perms out of domain · d22987b4
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
      d22987b4
  20. Oct 29, 2015
Loading