Skip to content
Snippets Groups Projects
  1. Feb 19, 2016
  2. Feb 10, 2016
    • dcashman's avatar
      Remove appdomain sysfs auditallow. · 1af60916
      dcashman authored
      Large numbers of denials have been collected.  Remove from logging until
      further action is taken to address existing denials and remove sysfs
      access from additional appdomains.
      
      (cherry-pick from commit: 0b80f4dc)
      
      Change-Id: I11b9b159702fb2d50d4352f9cd8b68503d07222a
      1af60916
  3. Feb 05, 2016
    • Daichi Hirono's avatar
      Add SELinux label for app fuse. · e178ac5a
      Daichi Hirono authored
      The labels for filesystem and files are assigned by vold with using
      context= mount option.
      
      Change-Id: I8a9d701a46a333093a27107fc3c52b17a2af1a94
      e178ac5a
  4. Jan 27, 2016
    • dcashman's avatar
      Allow apps to check attrs of /cache · 0e591bd2
      dcashman authored
      Address the following denial:
      type=1400 audit(0.0:261): avc: denied { getattr } for path="/cache" dev="mmcblk0p27" ino=2 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
      
      Bug: 26823157
      Change-Id: I937046969e92d96f2d31feceddd9ebe7c59bd3e6
      0e591bd2
  5. Jan 25, 2016
    • Jeff Vander Stoep's avatar
      app: connect to adbd · 2fdeab37
      Jeff Vander Stoep authored
      Permission to connect to adb was removed from untrusted_app when
      the domain_deprecated attribute was removed. Add it back to support
      debugging of apps. Grant to all apps as eventually
      domain_deprecated will be removed from everything.
      
      Bug: 26458796
      Change-Id: I4356e6d011094cdb6829210dd0eec443b21f8496
      2fdeab37
  6. Jan 23, 2016
    • Nick Kralevich's avatar
      app.te: grant /system dir/file/symlink read · 5c8854ab
      Nick Kralevich authored
      Renderscript needs the ability to read directories on
      /system. Allow it and file/symlink read access.
      
      Addresses the following denials:
        RenderScript: Invoking /system/bin/ld.mc with args '/system/bin/ld.mc -shared -nostdlib
          /system/lib64/libcompiler_rt.so -mtriple=aarch64-none-linux-gnueabi
          --library-path=/system/vendor/lib64 --library-path=/system/lib64
          -lRSDriver -lm -lc
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/primitives.o
          -o
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/librs.primitives.so'
        ld.mc   : type=1400 audit(0.0:1340): avc: denied { read } for name="lib64" dev="mmcblk0p24" ino=212 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        ld.mc   : type=1400 audit(0.0:1341): avc: denied { read } for name="lib64" dev="mmcblk0p29" ino=1187 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        RenderScript: Child process "/system/bin/ld.mc" terminated with status 256
      
      Change-Id: I9fb989f66975ed553dbc0c49e9c5b5e5bc45b3c3
      5c8854ab
  7. Jan 22, 2016
    • dcashman's avatar
      Allow access to /dev/ion and proc_net dir. · 8666bf25
      dcashman authored
      Address the following:
      01-21 13:35:41.147  5896  5896 W ndroid.music:ui: type=1400 audit(0.0:22): avc: denied { read } for name="ion" dev="tmpfs" ino=1237 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0
      01-21 13:35:41.152  5896  5896 E qdmemalloc: open_device: Failed to open ion device - Permission denied
      01-21 13:35:41.152  5896  5896 E qdgralloc: Could not mmap handle 0x7f827d7260, fd=55 (Permission denied)
      01-21 13:35:41.152  5896  5896 E qdgralloc: gralloc_register_buffer: gralloc_map failed
      
      and
      
      01-22 08:58:47.667  7572  7572 W Thread-23: type=1400 audit(0.0:186): avc: denied { search } for name="xt_qtaguid" dev="proc" ino=4026535741 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=dir permissive=0
      01-22 08:58:47.671  7498  7572 I qtaguid : Untagging socket 68 failed errno=-13
      01-22 08:58:47.671  7498  7572 W NetworkManagementSocketTagger: untagSocket(68) failed with errno -13
      
      Change-Id: Id4e253879fe0f6daadd04d148a257a10add68d38
      8666bf25
  8. Jan 20, 2016
  9. Jan 12, 2016
  10. Jan 08, 2016
    • Jeff Vander Stoep's avatar
      grant appdomain rw perms to tun_device · 2b935cd7
      Jeff Vander Stoep authored
      Previously granted to only untrusted_app, allow all apps except
      isolated_app read write permissions to tun_device.
      
      avc: denied { read write } for path="/dev/tun" dev="tmpfs" ino=8906 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:tun_device:s0 tclass=chr_file
      
      Bug: 26462997
      Change-Id: Id6f5b09cda26dc6c8651eb76f6791fb95640e4c7
      2b935cd7
    • Johan Redestig's avatar
      Neverallow isolated and untrusted apps to write system properties · 0d8e9adf
      Johan Redestig authored
      and as a consequence open up for other appdomains (e.g. platform_app)
      to write system properties.
      
      Change-Id: Ie6ad4d17247165564456e5b0d78f705a82cdcde7
      0d8e9adf
  11. Jan 07, 2016
    • Nick Kralevich's avatar
      su.te: drop domain_deprecated and app auditallow rules. · 0af2aa0b
      Nick Kralevich authored
      su is in permissive all the time. We don't want SELinux log
      spam from this domain.
      
      Addresses the following logspam:
      
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/graphics/fb0/vsync_event" dev="sysfs" ino=10815 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/thermal/thermal_zone2/temp" dev="sysfs" ino=15368 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { read } for comm="sh" name="emmc_therm" dev="sysfs" ino=17583 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: I8e17d3814e41b497b25ce00cd72698f0d22b3ab0
      0af2aa0b
    • Jeff Vander Stoep's avatar
      app: remove permission to execute gpu_device · 1911c27f
      Jeff Vander Stoep authored
      Not actually needed as demonstrated by the auditallow rule.
      
      Change-Id: Ia92c82ec237ab3490a1d51fa3371778e43e09504
      1911c27f
  12. Jan 06, 2016
  13. Jan 05, 2016
  14. Jan 04, 2016
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
  15. Dec 03, 2015
    • Jeff Vander Stoep's avatar
      Further restrict access to tun_device · e555f4b9
      Jeff Vander Stoep authored
      Remove bluetooth's access to tun_device. Auditallow rule demonstrates
      that it's not used.
      
      Strengthen the neverallow on opening tun_device to include all Apps.
      
      Bug: 24744295
      Change-Id: Iba85ba016b1e24c6c12d5b33e46fe8232908aac1
      e555f4b9
  16. Dec 02, 2015
    • Nick Kralevich's avatar
      Add permissions back to app / shell domains · 8ff6a86d
      Nick Kralevich authored
      Allow directory reads to allow tab completion in rootfs to work.
      
      "pm" is crashing due to failure to access /data/dalvik-cache. Add
      back in the permissions from domain_deprecated.
      
      Allow /sdcard to work again.
      
      Bug: 25954400
      Change-Id: I48cfa92fabfa47ed3007a63b85284659ba94ea73
      8ff6a86d
  17. Dec 01, 2015
  18. Nov 16, 2015
  19. Nov 11, 2015
    • Calin Juravle's avatar
      Add SElinux rules for /data/misc/trace · f255d775
      Calin Juravle authored
      The directory is to be used in eng/userdebug build to store method
      traces (previously stored in /data/dalvik-cache/profiles).
      
      Bug: 25612377
      
      Change-Id: Ia4365a8d1f13d33ee54115dc5e3bf62786503993
      f255d775
  20. Oct 19, 2015
  21. Oct 13, 2015
    • Nick Kralevich's avatar
      Remove ptrace from app.te · de11f501
      Nick Kralevich authored
      Remove ptrace from app.te, and only add it to the app domains
      which explicitly require it.
      
      Change-Id: I327aabd154ae07ce90e3529dee2b324ca125dd16
      de11f501
  22. Sep 14, 2015
  23. Sep 01, 2015
    • Daniel Micay's avatar
      auditallow gpu_device execute access · 73bdbd98
      Daniel Micay authored
      This permission appears to be unnecessary on some (most?) devices such
      as the Nexus 5. It should be moved to the device policy if it's truly
      required by the driver.
      
      Change-Id: I531dc82ba9030b805db2b596e145be2afb324492
      73bdbd98
  24. Aug 25, 2015
    • Stephen Smalley's avatar
      Only allow toolbox exec where /system exec was already allowed. · a3c97a76
      Stephen Smalley authored
      
      When the toolbox domain was introduced, we allowed all domains to exec it
      to avoid breakage.  However, only domains that were previously allowed the
      ability to exec /system files would have been able to do this prior to the
      introduction of the toolbox domain.  Remove the rule from domain.te and add
      rules to all domains that are already allowed execute_no_trans to system_file.
      Requires coordination with device-specific policy changes with the same Change-Id.
      
      Change-Id: Ie46209f0412f9914857dc3d7c6b0917b7031aae5
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      a3c97a76
  25. Jul 15, 2015
  26. May 18, 2015
  27. May 14, 2015
  28. Apr 18, 2015
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
  29. Apr 10, 2015
    • Nick Kralevich's avatar
      Revert "Exclude isolated_app from ptrace self." · 50d50621
      Nick Kralevich authored
      Google Breakpad (crash reporter for Chrome) relies on ptrace
      functionality. Without the ability to ptrace, the crash reporter
      tool is broken.
      
      Addresses the following denial:
      
        type=1400 audit(1428619926.939:1181): avc: denied { ptrace } for pid=10077 comm="CrRendererMain" scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:r:isolated_app:s0:c512,c768 tclass=process permissive=0
      
      This reverts commit e9623d8f.
      
      Bug: 20150694
      Bug: https://code.google.com/p/chromium/issues/detail?id=475270
      Change-Id: I1727c6a93f10ea6db877687a8f81ec789f9e501f
      50d50621
  30. Apr 09, 2015
  31. Apr 07, 2015
    • Nick Kralevich's avatar
      Allow system_server to collect app heapdumps (debug builds only) · 8a06c077
      Nick Kralevich authored
      On debuggable builds, system_server can request app heap dumps
      by running something similar to the following commands:
      
        % adb shell am set-watch-heap com.android.systemui 1048576
        % adb shell dumpsys procstats --start-testing
      
      which will dump the app's heap to /data/system/heapdump. See
      framework/base commit b9a5e4ad30c9add140fd13491419ae66e947809d.
      
      Allow this behavior.
      
      Addresses the following denial:
      
        avc: denied { write } for path="/data/system/heapdump/javaheap.bin" dev="dm-0" ino=150747 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
      
      Bug: 20073185
      Change-Id: I4b925033a5456867caf2697de6c2d683d0743540
      8a06c077
    • Jeff Sharkey's avatar
      Initial policy for expanded storage. · 73d9c2a9
      Jeff Sharkey authored
      Expanded storage supports a subset of the features of the internal
      data partition.  Mirror that policy for consistency.  vold is also
      granted enough permissions to prepare initial directories.
      
      avc: denied { write } for name="ext" dev="tmpfs" ino=3130 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { add_name } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { create } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { mounton } for path="/mnt/ext/57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { getattr } for path="/mnt/ext" dev="tmpfs" ino=3130 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=4471 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      avc: denied { getattr } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/media" dev="dm-0" ino=145153 scontext=u:r:vold:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1
      
      avc: denied { rmdir } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=6380 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      
      avc: denied { create } for name="tmp" scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="tmp" dev="dm-0" ino=72578 scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      
      Bug: 19993667
      Change-Id: I73c98b36e7c066f21650a9e16ea82c5a0ef3d6c5
      73d9c2a9
  32. Apr 03, 2015
    • Jeff Sharkey's avatar
      Apps need more than just search. · 3bdc0abc
      Jeff Sharkey authored
      avc: denied { getattr } for path="/storage/self" dev="tmpfs" ino=3129 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=0
      
      Change-Id: I802321331e9bd7ae41d3af7ace39364240db6d84
      3bdc0abc
    • Jeff Sharkey's avatar
      Consistent external storage policy. · 93fd6f0a
      Jeff Sharkey authored
      Apps, shell and adbd should all have identical access to external
      storage.  Also document where we have files and/or symlinks.
      
      Bug: 20055945
      Change-Id: I133ffcf28cc3ccdb0541aba18ea3b9ba676eddbe
      93fd6f0a
  33. Apr 01, 2015
    • dcashman's avatar
      Allow apps to dump meminfo to serial_console. · 361ed751
      dcashman authored
      Executing dumpsys meminfo over the console shell requires that output go to the
      console_device.  meminfo passes a fd to each applicaiton thread so that it can
      do this in IApplicationThread.dumpMemInfo().  Allow use of this fd.
      
      Addresses the following denial:
      type=1400 audit(1426793987.944:4224): avc: denied { read write } for pid=1809 comm="Binder_4" path="/dev/console" dev="tmpfs" ino=5684 scontext=u:r:platform_app:s0 tcontext=u:object_r:console_device:s0 tclass=chr_file
      
      Bug: 17135173
      Change-Id: Id5340a1fb3c8dbf41bda427720c4a0047bc557fc
      361ed751
  34. Mar 31, 2015
    • Jeff Sharkey's avatar
      Updated policy for external storage. · f063f461
      Jeff Sharkey authored
      An upcoming platform release is redesigning how external storage
      works.  At a high level, vold is taking on a more active role in
      managing devices that dynamically appear.
      
      This change also creates further restricted domains for tools doing
      low-level access of external storage devices, including sgdisk
      and blkid.  It also extends sdcardd to be launchable by vold, since
      launching by init will eventually go away.
      
      For compatibility, rules required to keep AOSP builds working are
      marked with "TODO" to eventually remove.
      
      Slightly relax system_server external storage rules to allow calls
      like statfs().  Still neverallow open file descriptors, since they
      can cause kernel to kill us.
      
      Here are the relevant violations that this CL is designed to allow:
      
      avc: denied { search } for name="user" dev="tmpfs" ino=7441 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { getattr } for path="/mnt/user/0" dev="tmpfs" ino=6659 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { write } for name="user" dev="tmpfs" ino=6658 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { add_name } for name="10" scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { create } for name="10" scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { setattr } for name="10" dev="tmpfs" ino=11348 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { search } for name="/" dev="tmpfs" ino=3131 scontext=u:r:zygote:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage/self" dev="tmpfs" ino=6659 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage/self" dev="tmpfs" ino=11348 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { read } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { open } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { search } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { write } for name="data" dev="tmpfs" ino=11979 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { add_name } for name="com.google.android.music" scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { create } for name="com.google.android.music" scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { use } for path="socket:[8297]" dev="sockfs" ino=8297 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { read write } for path="socket:[8297]" dev="sockfs" ino=8297 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=netlink_kobject_uevent_socket
      avc: denied { read } for path="pipe:[8298]" dev="pipefs" ino=8298 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fifo_file
      avc: denied { write } for path="pipe:[8298]" dev="pipefs" ino=8298 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fifo_file
      avc: denied { mounton } for path="/storage/emulated" dev="tmpfs" ino=8913 scontext=u:r:sdcardd:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage" dev="tmpfs" ino=7444 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { getattr } for path="/storage/self/primary" dev="tmpfs" ino=7447 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file
      avc: denied { read } for name="primary" dev="tmpfs" ino=7447 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file
      avc: denied { getattr } for path="/mnt/user" dev="tmpfs" ino=7441 scontext=u:r:system_server:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir
      avc: denied { read } for name="disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/vold/disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { getattr } for path="/dev/block/vold/disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { read } for name="/" dev="fuse" ino=0 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir
      avc: denied { open } for path="/storage/public:81F3-13EC" dev="fuse" ino=0 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir
      avc: denied { write } for name="data" dev="fuse" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir
      avc: denied { add_name } for name="com.google.android.googlequicksearchbox" scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir
      avc: denied { create } for name="com.google.android.googlequicksearchbox" scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir
      avc: denied { getattr } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { read } for name="public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { ioctl } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file
      avc: denied { use } for path="pipe:[3264]" dev="pipefs" ino=3264 scontext=u:r:sgdisk:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { use } for path="pipe:[3264]" dev="pipefs" ino=3264 scontext=u:r:sgdisk:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { search } for name="block" dev="tmpfs" ino=2494 scontext=u:r:sgdisk:s0 tcontext=u:object_r:block_device:s0 tclass=dir
      avc: denied { use } for path="pipe:[4200]" dev="pipefs" ino=4200 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { use } for path="pipe:[4200]" dev="pipefs" ino=4200 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { search } for name="/" dev="tmpfs" ino=3131 scontext=u:r:sdcardd:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=3127 scontext=u:r:sdcardd:s0 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { getattr } for path="pipe:[3648]" dev="pipefs" ino=3648 scontext=u:r:blkid:s0 tcontext=u:r:vold:s0 tclass=fifo_file
      avc: denied { use } for path="/dev/pts/12" dev="devpts" ino=15 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { use } for path="/dev/pts/12" dev="devpts" ino=15 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd
      avc: denied { use } for path="pipe:[4182]" dev="pipefs" ino=4182 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd
      
      Change-Id: Idf3b8561baecf7faa603fac5ababdcc5708288e1
      f063f461
  35. Mar 18, 2015
  36. Mar 16, 2015
    • Stephen Smalley's avatar
      Remove ability to read all /proc/pid/attr/current entries. · 2cba1ee1
      Stephen Smalley authored
      
      This was rendered obsolete when SELinuxDomainTest was ported
      to SELinuxHostTest and only makes sense if allowing search
      to domain:dir and { open read } to domain:file in order to
      open the /proc/pid/attr/current files in the first place.
      SELinux applies a further :process getattr check when
      reading any of the /proc/pid/attr/* files for any process
      other than self, which is no longer needed by app domains to
      pass CTS.
      
      Change-Id: Iff1e601e1268d4d77f64788d733789a2d2cd18cc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      2cba1ee1
Loading