Skip to content
Snippets Groups Projects
  1. Feb 05, 2016
    • dcashman's avatar
      Allow domain to read proc dirs. · abf31acb
      dcashman authored
      Ability to read all of proc was placed in domain_deprecated with the
      intention of reducing information leaking from proc.  Many processes try
      to read proc dirs, though.  Allow this with the belief that information
      leakage is from the proc files themselves rather than dir structure.
      
      Address the following denial:
      avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0
      
      Bug: 26833472
      Change-Id: I975ae022c093e1cf80de21487dc11e49f938e5a3
      abf31acb
    • Nick Kralevich's avatar
      Replace "neverallow domain" by "neverallow *" · 35a14514
      Nick Kralevich authored
      Modify many "neverallow domain" rules to be "neverallow *" rules
      instead. This will catch more SELinux policy bugs where a label
      is assigned an irrelevant rule, as well as catch situations where
      a domain attribute is not assigned to a process.
      
      Change-Id: I5b83a2504c13b384f9dff616a70ca733b648ccdf
      35a14514
  2. Feb 04, 2016
  3. Feb 03, 2016
    • Daichi Hirono's avatar
      Fix SELinux warning when passing fuse FD from system server. · 59e3d7b4
      Daichi Hirono authored
      Before applying the CL, Android shows the following error when passing
      FD of /dev/fuse.
      
      > Binder_2: type=1400 audit(0.0:38): avc: denied { getattr } for
      > path="/dev/fuse" dev="tmpfs" ino=9300 scontext=u:r:system_server:s0
      > tcontext=u:object_r:fuse_device:s0 tclass=chr_file permissive=0
      
      Change-Id: I59dec819d79d4e2e1a8e42523b6f521481cb2afd
      59e3d7b4
  4. Feb 01, 2016
  5. Jan 28, 2016
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      mediaserver: grant perms from domain_deprecated · 72e78bfc
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { getattr } for path="/proc/self" dev="proc" ino=4026531841 scontext=u:r:mediaserver:s0 tcontext=u:object_r:proc:s0 tclass=lnk_file permissive=1
      avc: denied { read } for name="mediadrm" dev="mmcblk0p24" ino=209 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=1
      avc: denied { open } for path="/vendor/lib/mediadrm" dev="mmcblk0p24" ino=209 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=1
      
      Change-Id: Ibffa0c9a31316b9a2f1912ae68a8dcd3a4e671b7
      72e78bfc
    • Jeff Vander Stoep's avatar
      logd: grant perms from domain_deprecated · 2f3979a7
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="psched" dev="proc" ino=4026536519 scontext=u:r:logd:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { open } for path="/proc/147/net/psched" dev="proc" ino=4026536519 scontext=u:r:logd:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { getattr } for path="/proc/147/net/psched" dev="proc" ino=4026536519 scontext=u:r:logd:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { read } for name="kmsg" dev="proc" ino=4026536603 scontext=u:r:logd:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
      avc: denied { open } for path="/proc/kmsg" dev="proc" ino=4026536603 scontext=u:r:logd:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
      avc: denied { getattr } for path="/proc/meminfo" dev="proc" ino=4026536598 scontext=u:r:logd:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
      
      Change-Id: Iaa67a6b8369c0449b09b64b807bc5819d6d68f02
      2f3979a7
    • Jeff Vander Stoep's avatar
      kernel: grant perms from domain_deprecated · bc2b76b0
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:kernel:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
      avc: denied { open } for path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:kernel:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
      avc: denied { read } for name="selinux_version" dev="rootfs" ino=4765 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
      avc: denied { open } for path="/selinux_version" dev="rootfs" ino=4765 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
      avc: denied { getattr } for path="/selinux_version" dev="rootfs" ino=4765 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
      
      Change-Id: I62cbffe85941677283d3b7bf8fc1c437671569a3
      bc2b76b0
  6. Jan 27, 2016
    • dcashman's avatar
      Allow apps to check attrs of /cache · 0e591bd2
      dcashman authored
      Address the following denial:
      type=1400 audit(0.0:261): avc: denied { getattr } for path="/cache" dev="mmcblk0p27" ino=2 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
      
      Bug: 26823157
      Change-Id: I937046969e92d96f2d31feceddd9ebe7c59bd3e6
      0e591bd2
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
    • Daniel Cashman's avatar
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      vold: grant perms from domain_deprecated · 9306072c
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: denied { open } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: denied { getattr } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      
      avc: denied { read } for name="/" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      avc: denied { open } for path="/cache" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      avc: denied { ioctl } for path="/cache" dev="mmcblk0p30" ino=2 ioctlcmd=5879 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir
      
      avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir
      avc: denied { open } for path="/proc" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir
      
      avc: denied { read } for name="psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: I8af7edc5b06675a9a2d62bf86e1c22dbb5d74370
      avc: denied { read } for name="block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
      avc: denied { open } for path="/sys/block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
      9306072c
    • Jeff Vander Stoep's avatar
      healthd: grant perms from domain_deprecated · 12401b8d
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      avc: denied { open } for path="/sys/devices/platform/htc_battery_max17050.8/power_supply/flounder-battery/present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: Iaee5b79a45aedad98e08c670addbf444c984165e
      12401b8d
    • Jeff Vander Stoep's avatar
      zygote: grant perms from domain_deprecated · cee6a0e7
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: Ie94d3db3c5dccb8077ef5da26221a6413f5d19c2
      cee6a0e7
    • dcashman's avatar
      Allow sdcardd tmpfs read access. · db559a34
      dcashman authored
      Address the following denial:
      type=1400 audit(1453854842.899:7): avc: denied { search } for pid=1512 comm="sdcard" name="/" dev="tmpfs" ino=7547 scontext=u:r:sdcardd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0
      
      vold: EmulatedVolume calls sdcard to mount on /storage/emulated.
      
      Bug: 26807309
      Change-Id: Ifdd7c356589f95165bba489dd06282a4087e9aee
      db559a34
    • Jeffrey Vander Stoep's avatar
    • Jeffrey Vander Stoep's avatar
      Revert "zygote: grant perms from domain_deprecated" · b898360e
      Jeffrey Vander Stoep authored
      This reverts commit e52fff83.
      
      Change-Id: Ieafb5214940585d63ff6f0b4802d8c7d1c126174
      b898360e
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      zygote: grant perms from domain_deprecated · e52fff83
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: I5b505ad386a445113bc0a1bb35d4f88f7761c048
      e52fff83
    • Sylvain Chouleur's avatar
      init: allow to access console-ramoops with newer kernels · 9a28f90d
      Sylvain Chouleur authored
      
      Since linux 3.18, commit 68c4a4f8abc60c9440ede9cd123d48b78325f7a3 has
      been integrated and requires syslog_read capability a process accessing
      console-ramoops file.
      
      sepolicy must be adapted to this new requirement.
      
      Change-Id: Ib4032a6bd96b1828a0154edc8fb510e3c1d3bdc2
      Signed-off-by: default avatarSylvain Chouleur <sylvain.chouleur@intel.com>
      9a28f90d
    • Narayan Kamath's avatar
    • Narayan Kamath's avatar
      Revert "Remove domain_deprecated from sdcard domains" · f4d7eef7
      Narayan Kamath authored
      This reverts commit 0c7bc58e.
      
      bug: 26807309
      
      Change-Id: I8a7b0e56a0d6f723508d0fddceffdff76eb0459a
      f4d7eef7
    • Jeff Vander Stoep's avatar
      domain: grant write perms to cgroups · be0616ba
      Jeff Vander Stoep authored
      Was moved to domain_deprecated. Move back to domain.
      
      Files in /acct/uid/*/tasks are well protected by unix permissions.
      No information is leaked with write perms.
      
      Change-Id: I8017e906950cba41ce350bc0892a36269ade8d53
      be0616ba
    • dcashman's avatar
      Restore untrusted_app proc_net access. · 5833e3f5
      dcashman authored
      Address the following denial:
      type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0
      
      Bug: 26806629
      Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
      5833e3f5
  7. Jan 26, 2016
Loading