Skip to content
Snippets Groups Projects
  1. Nov 02, 2017
  2. Oct 31, 2017
    • Tri Vo's avatar
      Neverallow coredomain to kernel interface files. · 502e43f7
      Tri Vo authored
      Core domains should not be allowed access to kernel interfaces,
      which are not explicitly labeled. These interfaces include
      (but are not limited to):
      
      1. /proc
      2. /sys
      3. /dev
      4. debugfs
      5. tracefs
      6. inotifyfs
      7. pstorefs
      8. configfs
      9. functionfs
      10. usbfs
      11. binfmt_miscfs
      
      We keep a lists of exceptions to the rule, which we will be gradually shrinking.
      This will help us prevent accidental regressions in our efforts to label
      kernel interfaces.
      
      Bug: 68159582
      Test: bullhead, sailfish can build
      Change-Id: I8e466843e1856720f30964546c5c2c32989fa3a5
      502e43f7
  3. Oct 27, 2017
    • Treehugger Robot's avatar
    • Calin Juravle's avatar
      Allow installd to read system_data_file:lnk_file · 97b08903
      Calin Juravle authored
      The permission was removed in
      https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/433615/
      but is still needed in order to optimize application code.
      
      Denial example:
      
      10-26 16:29:51.234   894  1469 D PackageManager.DexOptimizer: Running
      dexopt on: /data/user/0/com.google.android.gms/snet/installed/snet.jar
      pkg=com.google.android.gms isa=[arm64]
      dexoptFlags=boot_complete,public,secondary,force,storage_ce
      target-filter=quicken
      
      10-26 16:29:51.253  2148  2148 W Binder:695_5: type=1400 audit(0.0:39):
      avc: denied { read } for name="0" dev="sda35" ino=917506
      scontext=u:r:installd:s0 tcontext=u:object_r:system_data_file:s0
      tclass=lnk_file permissive=0
      
      Test: adb shell cmd package reconcile-secondary-dex-files
      com.google.android.googlequicksearchbox
      adb shell cmd package compile -m speed --secondary-dex
      com.google.android.gms
      
      Change-Id: I694d1a780e58fa953d9ebda807f5f5293dbb0d56
      97b08903
  4. Oct 26, 2017
    • Tri Vo's avatar
      Recovery: remove sysfs access · c1329604
      Tri Vo authored
      Bug: 65643247
      Test: adb sideload an ota package
      Test: mount /system
      Test: view recovery logs
      Test: run graphics test
      Test: run locale test
      Test: wipe data/factory reset
      Test: factory reset from Settings app
      Tested on sailfish; no selinux denials to sysfs type are observed.
      
      Change-Id: Ic8487d53d90b7d1d050574e0b084627d1b6abdba
      c1329604
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      recovery: fix denials during factory reset · 7e5c2883
      Tri Vo authored
      Addresses these denials when wiping data on sailfish:
      
      avc:  denied  { open } for  pid=488 comm="mke2fs_static"
      path="/proc/swaps" dev="proc" ino=4026532415 scontext=u:r:recovery:s0
      tcontext=u:object_r:proc_swaps:s0 tclass=file permissive=1
      
      avc:  denied  { search } for  pid=488 comm="mke2fs_static"
      name="features" dev="sysfs" ino=30084 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=dir permissive=1
      
      avc:  denied  { read } for  pid=488 comm="mke2fs_static"
      name="lazy_itable_init" dev="sysfs" ino=30085 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_fs_ext4_features:s0 tclass=file permissive=1
      
      Test: Wipe data/factory reset -> no selinux denials
      Change-Id: Ia9e2e4fd4a1c604c9286a558ef0fe43fd153e3bc
      7e5c2883
    • Treehugger Robot's avatar
  5. Oct 25, 2017
  6. Oct 24, 2017
  7. Oct 23, 2017
  8. Oct 21, 2017
    • Jeff Vander Stoep's avatar
      hal_audio: remove access to audiohal_data_file · b1a921e2
      Jeff Vander Stoep authored
      This is no longer used and violates Treble data separation.
      
      Bug: 68057930
      Test: verify on Sailfish that /data/misc/audiohal doesn't exist
          This dir appears to be Qualcomm specific and should not have
          been defined in core policy.
      
      Change-Id: I55fba7564203a7f8a1d8612abd36ec1f89dc869d
      b1a921e2
  9. Oct 20, 2017
Loading