Skip to content
Snippets Groups Projects
  1. Apr 18, 2018
    • Tianjie Xu's avatar
      Allow dumpstate to read the update_engine logs · 7d474279
      Tianjie Xu authored
      Denial message:
      avc: denied { read } for pid=2775 comm="dumpstate" name="update_engine_log"
      dev="sda35" ino=3850274 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:update_engine_log_data_file:s0 tclass=dir permissive=0
      
      Bug: 78201703
      Test: take a bugreport
      Change-Id: I2c788c1211812aa0fcf58cee37a6e8f955424849
      7d474279
  2. Apr 17, 2018
    • Treehugger Robot's avatar
      53cabd6c
    • Treehugger Robot's avatar
      cc23e48f
    • Mark Salyzyn's avatar
      init: lock down access to keychord_device · f14f7354
      Mark Salyzyn authored
      The out-of-tree keychord driver is only intended for use by init.
      
      Test: build
      Bug: 64114943
      Bug: 78174219
      Change-Id: I96a7fbcd9a54a38625063606f5c4ab6d40d701f6
      f14f7354
    • Florian Mayer's avatar
      Make traced_probes mlstrustedsubject. · 4378ba7c
      Florian Mayer authored
      Denials:
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5684): avc: denied { search } for name="1376" dev="proc" ino=204553 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app_27:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5685): avc: denied { search } for name="1402" dev="proc" ino=204554 scontext=u:r:traced_probes:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.801   903   903 W traced_probes: type=1400 audit(0.0:5686): avc: denied { search } for name="1496" dev="proc" ino=204557 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app:s0:c85,c256,c512,c768 tclass=dir permissive=0
      04-12 12:42:47.805   903   903 W traced_probes: type=1400 audit(0.0:5687): avc: denied { search } for name="1758" dev="proc" ino=204563 scontext=u:r:traced_probes:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=dir permissive=0
      
      Bug: 77955286
      
      Change-Id: If0985d3ddd7d14c2b139be1c842c9c8df99b90db
      Merged-In: If0985d3ddd7d14c2b139be1c842c9c8df99b90db
      4378ba7c
  3. Apr 16, 2018
  4. Apr 13, 2018
    • Jeff Sharkey's avatar
    • Treehugger Robot's avatar
      6b1ce73e
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      whitelist test failure that bypassed presubmit · 4c402df7
      Jeff Vander Stoep authored
      avc: denied { read } for comm="batterystats-wo" name="show_stat" dev="sysfs"
      scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Bug: 77816522
      Test: build
      Change-Id: I50a9bfe1a9e4df9c84cf4b2b4aedbb8f82ac94cd
      (cherry picked from commit 2ccd99a5)
      4c402df7
    • Suren Baghdasaryan's avatar
      Selinux: Give lmkd read access to /proc/meminfo · 76384b3e
      Suren Baghdasaryan authored
      
      Allow lmkd read access to /proc/meminfo for retrieving information
      on memory state.
      
      Change-Id: I7cf685813a5a49893c8f9a6ac4b5f6619f3c18aa
      Signed-off-by: default avatarSuren Baghdasaryan <surenb@google.com>
      76384b3e
    • Jeff Vander Stoep's avatar
      tombstoned: allow unlinking anr files · eb8f938f
      Jeff Vander Stoep authored
      Tombstoned unlinks "trace_XX" files if there are too many of them.
      
      avc: denied { unlink } for comm="tombstoned" name="trace_12"
      scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0
      tclass=file
      
      Bug: 77970585
      Test: Build/boot taimen. adb root; sigquit an app.
      Change-Id: I2c7cf81a837d82c4960c4c666b38cd910885d78d
      eb8f938f
    • Treehugger Robot's avatar
      bf41ff48
    • Jeff Sharkey's avatar
      Add exFAT support; unify behind "sdcard_type". · 000cafc7
      Jeff Sharkey authored
      We're adding support for OEMs to ship exFAT, which behaves identical
      to vfat.  Some rules have been manually enumerating labels related
      to these "public" volumes, so unify them all behind "sdcard_type".
      
      Test: atest
      Bug: 67822822
      Change-Id: I09157fd1fc666ec5d98082c6e2cefce7c8d3ae56
      000cafc7
    • Chia-I Wu's avatar
      Make persist.sys.sf.native_mode an integer · 9047a4de
      Chia-I Wu authored
      This allows for more native modes.
      
      Bug: 73824924
      Test: adb shell setprop persist.sys.sf.native_mode 2
      Change-Id: Iffdeadc8dc260de4b0c7f2b46aab08d64d25e3b1
      9047a4de
    • Joel Galenson's avatar
      Allow some vold_prepare_subdirs denials. · fc870ce9
      Joel Galenson authored
      This addresses the following denials:
      
      avc: denied { fowner } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=file
      avc: denied { relabelfrom } for comm="vold_prepare_su" name="storaged" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { getattr } for comm="rm" scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 77875245
      Test: Boot device.
      Test: Mislabel directories used by vold_prepare_subdirs, reboot, and
      ensure it can relabel them without denials.
      Test: Add user, reboot, delete user, reboot, observe no denials.
      
      (cherry picked from commit 855dd5a8562494f78f99e5bd5096f617ac70438f)
      
      Merged-In: Id67bc99f151a6ccb9619bbfb7080452956405121
      Change-Id: I2f6b5abfaf81570d03a30f2edf7296b5afd10c9b
      fc870ce9
    • Tom Cherry's avatar
      Allow vendor_init to write to misc_block_device · db465285
      Tom Cherry authored
      Vendors may use this to write custom messages to their bootloader, and
      as the bootloader is under vendor control, this makes sense to allow.
      
      Bug: 77881566
      Test: build
      Change-Id: I78f80400e5f386cad1327a9209ee1afc8e334e56
      db465285
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · 224921d1
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      224921d1
  5. Apr 12, 2018
  6. Apr 11, 2018
    • Jeff Vander Stoep's avatar
      hal_tetheroffload: move hwservice mapping to core policy · c41f5b84
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { find } for
      interface=android.hardware.tetheroffload.config::IOffloadConfig
      scontext=u:r:system_server:s0
      tcontext=u:object_r:default_android_hwservice:s0
      tclass=hwservice_manager
      
      Bug: 77855688
      Test: build/boot Sailfish, turn on tethering, no selinux denial
      Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
      (cherry picked from commit 3a346ea7)
      c41f5b84
    • Treehugger Robot's avatar
      Merge changes If2413c30,Ic5d7c961 · 45b4704e
      Treehugger Robot authored
      * changes:
        Suppress spurious denial
        Suppress spurious denial
      45b4704e
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · 7e5ec2bc
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } scontext=u:r:zygote:s0
      tcontext=u:r:zygote:s0 tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: If2413c3005df02a70661464d695211acbcda4094
      (cherry picked from commit 816e744d998cb327fbd20f3124b22398bea2b8e4)
      7e5ec2bc
    • Jeff Vander Stoep's avatar
      Suppress spurious denial · f7a7f7d1
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { sys_resource } for comm="ip6tables" capability=24
      scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0
      tclass=capability
      
      Bug: 77905989
      Test: build and flash taimen-userdebug
      Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c
      (cherry picked from commit 443a43c9)
      f7a7f7d1
    • Treehugger Robot's avatar
      be79c7b2
  7. Apr 10, 2018
    • Treehugger Robot's avatar
      6cdc9a82
    • Jeff Vander Stoep's avatar
      priv_app: remove more logspam · 9dc1d538
      Jeff Vander Stoep authored
      avc: denied { read } for name="ext4" dev="sysfs" ino=32709
      scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0
      tclass=dir permissive=0 b/72749888
      avc: denied { read } for name="state" dev="sysfs" ino=51318
      scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:sysfs_android_usb:s0 tclass=file permissive=0
      b/72749888
      
      Bug: 72749888
      Test: build/boot taimen-userdebug. No more logspam
      Change-Id: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      Merged-In: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e
      (cherry picked from commit 558cdf1e)
      9dc1d538
    • Treehugger Robot's avatar
      Merge "Widen crash_dump dontaudit." · 354a2530
      Treehugger Robot authored
      354a2530
    • Tri Vo's avatar
      Add internal types to 27.0[.ignore].cil. · fad493bf
      Tri Vo authored
      Bug: 69390067
      Test: manual run of treble_sepolicy_tests
      Change-Id: I1b772a3f7c96875765c75bfc1031f249411c3338
      Merged-In: I1b772a3f7c96875765c75bfc1031f249411c3338
      (cherry picked from commit 9fbd6520)
      fad493bf
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · bf4afae1
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      bf4afae1
    • Florian Mayer's avatar
Loading