Skip to content
Snippets Groups Projects
  1. Dec 14, 2015
  2. Dec 13, 2015
  3. Dec 12, 2015
    • Nick Kralevich's avatar
      bluetoothdomain.te: drop allow bluetoothdomain self:socket create_socket_perms; · d0113ae0
      Nick Kralevich authored
      An auditallow has been in place since commit
      cb835a28 but nothing has been triggered.
      Remove the rule.
      
      Bug: 25768265
      Change-Id: Ia9f35c41feabc9ccf5eb5c6dae09c68dc4f465ff
      d0113ae0
    • Nick Kralevich's avatar
      bluetoothdomain.te: drop bluetooth unix_stream_socket auditallow · a1f903da
      Nick Kralevich authored
      Yes, it's being used.
      
        type=1400 audit(0.0:19391): avc: granted { read write } for comm="Binder_4" path="socket:[1354209]" dev="sockfs" ino=1354209 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:19392): avc: granted { read } for comm="pandora.android" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:19393): avc: granted { read } for comm="TransportReader" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:19398): avc: granted { shutdown } for comm="AppLinkBluetoot" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:19400): avc: granted { getopt } for comm="AppLinkBluetoot" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:12517): avc: granted { write } for comm="MultiQueueWrite" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
        type=1400 audit(0.0:12563): avc: granted { read } for comm="WearableReader" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:bluetooth:s0 tclass=unix_stream_socket
      
      and a lot more...
      
      Bug: 25767747
      Change-Id: I15f89be1f44eef471e432e6d9f9ecb60a43801f8
      a1f903da
  4. Dec 11, 2015
  5. Dec 10, 2015
    • Nick Kralevich's avatar
      su.te: dontaudit su property_type:file · 1638208f
      Nick Kralevich authored
      The "su" domain is in globally permissive mode on userdebug/eng
      builds. No SELinux denials are suppose to be generated when running
      under "su".
      
      Get rid of useless SELinux denials coming from su trying to stat
      files in /dev/__properties__. For example: "ls -la /dev/__properties__"
      as root.
      
      Addresses the following denials:
      
        avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:wc_transport_prop:s0" dev="tmpfs" ino=10597 scontext=u:r:su:s0 tcontext=u:object_r:wc_transport_prop:s0 tclass=file permissive=1
        avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:qseecomtee_prop:s0" dev="tmpfs" ino=10596 scontext=u:r:su:s0 tcontext=u:object_r:qseecomtee_prop:s0 tclass=file permissive=1
        avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:radio_atfwd_prop:s0" dev="tmpfs" ino=10595 scontext=u:r:su:s0 tcontext=u:object_r:radio_atfwd_prop:s0 tclass=file permissive=1
        avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:qcom_ims_prop:s0" dev="tmpfs" ino=10594 scontext=u:r:su:s0 tcontext=u:object_r:qcom_ims_prop:s0 tclass=file permissive=1
        avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:contexthub_prop:s0" dev="tmpfs" ino=10593 scontext=u:r:su:s0 tcontext=u:object_r:contexthub_prop:s0 tclass=file permissive=1
      
      Change-Id: Ief051a107f48c3ba596a31d01cd90fb0f3442a69
      1638208f
    • Nick Kralevich's avatar
      Restore sysfs_devices_system_cpu to domain.te · 4e2d2245
      Nick Kralevich authored
      Lots of processes access CPU information. This seems to be triggered
      by libraries loaded into every Android process. Allow the access.
      
      Addresses the following denials:
      
      adbd    : type=1400 audit(0.0:3): avc: denied { search } for name="cpu" dev="sysfs" ino=32 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir permissive=1
      adbd    : type=1400 audit(0.0:4): avc: denied { read } for name="online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1
      adbd    : type=1400 audit(0.0:5): avc: denied { open } for path="/sys/devices/system/cpu/online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1
      adbd    : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/devices/system/cpu/online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1
      
      Change-Id: Ie7bfae53bdf670028db724d2720447ead42bad35
      4e2d2245
  6. Dec 09, 2015
  7. Dec 08, 2015
  8. Dec 07, 2015
    • Nick Kralevich's avatar
      adbd: allow ddms screen capture to work again · 5e8402df
      Nick Kralevich authored
      The removal of domain_deprecated broke ddms screen capturing
      functionality.
      
      Steps to reproduce:
      
      1) Run "ddms"
      2) Select your device
      3) Go to the Device > Screen Capture menu
      4) Attempt to take a screenshot
      
      Addresses the following denials:
      
        avc: denied { read } for pid=2728 comm="screencap" name="ion" dev="tmpfs" ino=7255 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { open } for pid=2728 comm="screencap" name="ion" dev="tmpfs" ino=7255 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { ioctl } for pid=2728 comm="screencap" path="/dev/ion" dev="tmpfs" ino=7255 ioctlcmd=4905 scontext=u:r:adbd:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
        avc: denied { read } for pid=5261 comm="screencap" name="egl" dev="dm-1" ino=210 scontext=u:r:adbd:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        avc: denied { read } for pid=5261 comm="screencap" name="egl" dev="dm-1" ino=210 scontext=u:r:adbd:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
      
      Bug: 26023462
      Change-Id: Ie77c65900de56756d5c9b99dcda1e20664151ed2
      5e8402df
    • Nick Kralevich's avatar
      adbd: allow "adb pull /sdcard/" · e9d43070
      Nick Kralevich authored
      am: b899f4fc
      
      * commit 'b899f4fc':
        adbd: allow "adb pull /sdcard/"
      e9d43070
    • Nick Kralevich's avatar
      adbd: allow "adb pull /sdcard/" · b899f4fc
      Nick Kralevich authored
      The removal of domain_deprecated broke the ability for adbd to
      pull files from /sdcard. Re-allow it.
      
      Addresses the following denials:
      
        avc: denied { search } for pid=2753 comm=73657276696365203530 name="/" dev="tmpfs" ino=6242 scontext=u:r:adbd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0
        avc: denied { getattr } for pid=2755 comm=73657276696365203431 path="/sdcard" dev="rootfs" ino=5472 scontext=u:r:adbd:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=0
      
      Change-Id: I70257933f554abd008932c7f122dd0151f464b05
      b899f4fc
  9. Dec 04, 2015
  10. Dec 03, 2015
Loading