Skip to content
Snippets Groups Projects
  1. Jun 13, 2015
  2. Jun 11, 2015
  3. Jun 10, 2015
  4. Jun 09, 2015
  5. Jun 08, 2015
    • dcashman's avatar
      Remove service_manager_local_audit_domain. · eab26faa
      dcashman authored
      service_manager_local_audit_domain was used to fine tune the service_manager
      auditallow rules when introducing the service_manager SELinux rules.  This is no
      longer needed.
      
      Bug: 21656807
      Change-Id: Ia042a887e7bf9eb2a2b08b8d831e68dfe6395f75
      eab26faa
  6. Jun 02, 2015
    • Mark Salyzyn's avatar
      logd: logpersistd · 0d22c6ce
      Mark Salyzyn authored
      - Enable logpersistd to write to /data/misc/logd
      - Enable logpersistd to read from pstore to help complete any content
        lost by reboot disruption
      - Enable shell readonly ability logpersistd files in /data/misc/logd
      - Enable logcat -f when placed into logd context to act as a
        logpersistd (nee logcatd) agent, restrict access to run only in
        userdebug or eng
      
      Bug: 19608716
      Change-Id: I3209582bc796a1093c325c90068a48bf268e5ab5
      0d22c6ce
  7. May 28, 2015
    • dcashman's avatar
      Allow system_app to find all system services. · bf0c34d5
      dcashman authored
      SystemPropPoker in settings app lists and communicates with every service on the
      system on property change, which is not currently allowed for all services.
      
      This occurs, for instance, when toggling
      Developer options -> Monitoring -> Profile GPU Rendering -> On scren as bars.
      
      Addresses the following denials:
      SELinux : avc:  denied  { find } for service=samplingprofiler scontext=u:r:system_app:s0 tcontext=u:object_r:samplingprofiler_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=DockObserver scontext=u:r:system_app:s0 tcontext=u:object_r:DockObserver_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=devicestoragemonitor scontext=u:r:system_app:s0 tcontext=u:object_r:devicestoragemonitor_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=media.camera.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:cameraproxy_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=scheduling_policy scontext=u:r:system_app:s0 tcontext=u:object_r:scheduling_policy_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=battery scontext=u:r:system_app:s0 tcontext=u:object_r:battery_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=processinfo scontext=u:r:system_app:s0 tcontext=u:object_r:processinfo_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=batteryproperties scontext=u:r:system_app:s0 tcontext=u:object_r:healthd_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=drm.drmManager scontext=u:r:system_app:s0 tcontext=u:object_r:drmserver_service:s0 tclass=service_manager
      SELinux : avc:  denied  { find } for service=commontime_management scontext=u:r:system_app:s0 tcontext=u:object_r:commontime_management_service:s0 tclass=service_manager
      
      Bug: 20762975
      Bug: 21446739
      Change-Id: I92b7629077eb5aabffb72170f4ef71f574ebb95c
      bf0c34d5
  8. May 26, 2015
  9. May 22, 2015
  10. May 21, 2015
  11. May 18, 2015
  12. May 15, 2015
  13. May 14, 2015
  14. May 13, 2015
  15. May 12, 2015
    • Chad Brubaker's avatar
      Add keystore user_changed permission · 520bb816
      Chad Brubaker authored
      user_changed will be used for state change methods around android user
      creation/deletion.
      
      Change-Id: I295ca9adfc4907b5d7bcf0555f6e5a9a3379635b
      520bb816
    • dcashman's avatar
    • dcashman's avatar
      Fix sepolicy-analyze libc++.so loading issue w/CTS. · 28acbeab
      dcashman authored
      Addresses the following error when running CTS on master:
      junit.framework.AssertionFailedError: The following errors were encountered when validating the SELinuxneverallow rule:
      neverallow { appdomain -bluetooth } self:capability *;
      /tmp/SELinuxHostTest5593810182495331783.tmp: error while loading shared libraries: libc++.so: cannot open shared object file: No such file or directory
      
      Also indicate that none of the sepolicy tools need c++ std lib.
      
      (cherry-pick of 0cdb0517be696c0dc6882d289eedd45bf2da918c now made possible by
      addition of commit: 28b72eddd54cb1287dd7daae853e8e4b78fa17eb)
      
      Bug: 19617220
      Change-Id: I2c5b7ab1ddeb0e02cbaad2b7d5430a0974524a89
      28acbeab
    • Paul Crowley's avatar
      Allow vold to create subdirectories within its private area. · 421dadbc
      Paul Crowley authored
      AVC message we get without this change creating
      /data/misc/vold/user_keys
      
      05-12 08:57:54.839   189   189 W vold    : type=1400 audit(0.0:176):
      avc: denied { create } for name="user_keys" scontext=u:r:vold:s0
      tcontext=u:object_r:vold_data_file:s0 tclass=dir permissive=0
      
      Bug: 19704432
      Change-Id: I10fc90c64c7c10fa9811133a4289663ae8617607
      421dadbc
  16. May 07, 2015
  17. May 06, 2015
    • Nick Kralevich's avatar
      Label /oem files · 2025fd14
      Nick Kralevich authored
      Files on the /oem partition are weird. The /oem partition is an ext4
      partition, built in the Android tree using the "oem_image" build target
      added in build/ commit b8888432f0bc0706d5e00e971dde3ac2e986f2af. Since
      it's an ext4 image, it requires SELinux labels to be defined at build
      time. However, the partition is mounted using context=u:object_r:oemfs:s0,
      which ignores the labels on the filesystem.
      
      Assign all the files on the /oem image to be oemfs, which is consistent
      with how they'll be mounted when /oem is mounted.
      
      Other options would be to use an "unlabeled" label, or try to fix the
      build system to not require SELinux labels for /oem images.
      
      Bug: 20816563
      Change-Id: Ibe8d9ff626eace8a2d5d02c3f06290105baa59fe
      2025fd14
    • Nick Kralevich's avatar
      Don't label simpleperf system_file · 1212235f
      Nick Kralevich authored
      The default label for files on /system is already system_file. No
      need to explicitly specify it.
      
      Change-Id: If0c92a0da4119a0d8f83b4a3e05101cfcdb9a82d
      1212235f
    • Nick Kralevich's avatar
    • Dehao Chen's avatar
      Update sepolicy to add label for /data/misc/perfprofd. · 7d66f783
      Dehao Chen authored
      Bug: 19483574
      Change-Id: I7e4c0cf748d2b216dcb3aede3803883552b58b64
      7d66f783
    • Nick Kralevich's avatar
      kernel: allow rebooting, and writing to /dev/__kmsg__ · e550e79c
      Nick Kralevich authored
      Addresses the following denials:
      
        avc:  denied  { write } for  pid=1 comm="init" path=2F6465762F5F5F6B6D73675F5F202864656C6574656429 dev="tmpfs" ino=7214 scontext=u:r:kernel:s0 tcontext=u:object_r:tmpfs:s0 tclass=chr_file permissive=0
        avc:  denied  { write } for  pid=1 comm="init" name="sysrq-trigger" dev="proc" ino=4026534153 scontext=u:r:kernel:s0 tcontext=u:object_r:proc_sysrq:s0 tclass=file permissive=0
        avc:  denied  { sys_boot } for  pid=1 comm="init" capability=22  scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
      
      Change-Id: I46be370d520c4492d97c6ed7ccdc55cc20b22c49
      e550e79c
  18. May 05, 2015
Loading