- Nov 01, 2017
-
-
Max Bires authored
This denial affects marlin as well Test: The associated denials are properly tagged with this bug Change-Id: Ie90f1ac8c9a930465d8b806d77c2975c5f046403
-
- Oct 23, 2017
-
-
Jeffrey Vander Stoep authored
-
Treehugger Robot authored
-
Tri Vo authored
-
Nick Kralevich authored
The following error is occurring on master: 10-23 16:24:24.785 shell 4884 4884 E SELinux : seapp_context_lookup: No match for app with uid 2000, seinfo platform, name com.google.android.traceur 10-23 16:24:24.785 shell 4884 4884 E SELinux : selinux_android_setcontext: Error setting context for app with uid 2000, seinfo platform:targetSdkVersion=23:complete: Success 10-23 16:24:24.785 shell 4884 4884 E Zygote : selinux_android_setcontext(2000, 0, "platform:targetSdkVersion=23:complete", "com.google.android.traceur") failed 10-23 16:24:24.785 shell 4884 4884 F zygote64: jni_internal.cc:593] JNI FatalError called: frameworks/base/core/jni/com_android_internal_os_Zygote.cpp:648: selinux_android_setcontext failed 10-23 16:24:24.818 shell 4884 4884 F zygote64: runtime.cc:535] Runtime aborting... Bug: 68126425 Bug: 68032516 This reverts commit 714ee5f2. Change-Id: I7356c4e4facb1e532bfdeb575acf2d83761a0852
-
Tri Vo authored
Addresses this denial during CtsBionicTestCases: avc: denied { getattr } for path="/proc/version" dev="proc" ino=4026532359 scontext=u:r:shell:s0 tcontext=u:object_r:proc_version:s0 tclass=file permissive=0 Bug: 68067856 Test: cts-tradefed run commandAndExit cts -m CtsBionicTestCases --skip-all-system-status-check --primary-abi-only --skip-preconditions No more denials to /proc/version Change-Id: I7e927fbaf1a8ce3637e09452cbd50f475176838e
-
Paul Crowley authored
-
- Oct 21, 2017
-
-
Jeff Vander Stoep authored
This is no longer used and violates Treble data separation. Bug: 68057930 Test: verify on Sailfish that /data/misc/audiohal doesn't exist This dir appears to be Qualcomm specific and should not have been defined in core policy. Change-Id: I55fba7564203a7f8a1d8612abd36ec1f89dc869d
-
- Oct 20, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Paul Crowley authored
Bug: 25861755 Test: Boot device, create user, create files, remove user, observe logs Change-Id: I195514eb45a99c1093998786ab385338463269c0 Merged-In: I195514eb45a99c1093998786ab385338463269c0 (cherry picked from commit eb7340d9)
-
Tri Vo authored
Remove netd access to sysfs_type attribute. These were moved from vendor to fwk policy: 1. sysfs_net type declaration 2. labeling of /sys/devices/virtual/net with sysfs_net 3. netd access to sysfs_net Bug: 65643247 Test: can browse internet without netd denials Test: netd_unit_test, netd_integration_test without netd denials Merged-In: Ic1b95a098f438c4c6bc969bee801bf7dd1a13f6e Change-Id: Ic1b95a098f438c4c6bc969bee801bf7dd1a13f6e (cherry picked from commit e62a56b7)
-
Treehugger Robot authored
* changes: Shell: grant permission to run lsmod Dumpstate: cleanup denial logspam
-
Max Bires authored
-
Jeff Vander Stoep authored
No sign of these denials getting cleaned up, so supress them in core policy. Test: build Change-Id: I0320425cb72cbd15cef0762090899491338d4f7c
-
Nick Kralevich authored
When we removed /data/dalvik-cache execute permission for system_server (b/37214733, b/31780877), I forgot to fixup this neverallow rule. Fix rule. Test: policy compiles. Change-Id: I38b821a662e0d8304b8390a69a6d9e923211c31e
-
Jeff Vander Stoep authored
lsmod needs access to /proc/modules Test: build, run lsmod Change-Id: Icb6ea6ce791cc6a22c89aa8e90c44749497c8468
-
Jeff Vander Stoep authored
Dumpstate lists all services and then enumerates over them. Suppress "find" denials for services which dumpstate is neverallowed access to. Dumpstate includes the kernel command line in bug reports. Grant access to /proc/cmdline. Test: build. Run adb bugreport. Change-Id: I89b546c728a034638f9257c6cf93366d99a10762
-
Nick Kralevich authored
Don't allow apps to run with uid=shell or selinux domain=shell unless the package is com.android.shell. Add a neverallow assertion (compile time assertion + CTS test) to ensure no regressions. Bug: 68032516 Test: policy compiles, device boots, and no obvious problems. Change-Id: Ic6600fa5608bfbdd41ff53840d904f97d17d6731
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Nick Kralevich authored
The use of SIOCATMARK is not recommended per rfc6093. This ioctl is not currently allowed on Android. Add a neverallowxperm statement (compile time assertion + CTS test) to ensure this never regresses. Bug: 68014825 Test: policy compiles. Change-Id: I41272a0cb157ac9aa38c8e67aabb8385403815f9
-
Treehugger Robot authored
-
- Oct 19, 2017
-
-
Treehugger Robot authored
-
Max Bires authored
This is to simplify access for hal_audio Test: ls -Z in /proc/asound correctly shows everything with proc_asound selinux label Change-Id: I66ed8babf2363bee27a748147eb358d57a4594c4
-
Tri Vo authored
Access to /sys/class/android_usb/ was lost when that dir received a new label sysfs_android_usb. Bug: 65643247 Test: can enter recovery mode and sideload through usb without denials to /sys Change-Id: I22821bab9833b832f13e0c45ff8da4dae115fa4d
-
Treehugger Robot authored
-
Treehugger Robot authored
-
William Roberts authored
Code review of: - https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/512420/ had some comments. These were addressed and upstreamed here: - https://github.com/TresysTechnology/refpolicy/commit/65620e0f94541195fed45f34d4fc1218b4e0d6f3 Bring these changes back into the AOSP tree. Test: verify that output sorted device files did not change hashes when built. Change-Id: I7f07d3f74923cf731e853629034469784fc669f7 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Treehugger Robot authored
-
- Oct 18, 2017
-
-
Chih-Hung Hsieh authored
Bug: 66996870 Test: build with WITH_TIDY=1 Change-Id: I5df432c6d2f7ee19db89f44fbe3adec2bbcc0b41
-
Dan Cashman authored
This file is necessary for using an mr1 system image in conjunction with an oc-dev vendor image. This is currently needed by GSI testing, for example. (cherry-pick of commit: 03596f28) Bug: 66358348 Test: File is included on system image. Change-Id: Ie694061d08acf17453feb596480e42974f8c714c
-
Mikhail Naganov authored
Reason: breaks "Ok google". Soundtrigger module needs to access /proc/asound/pcm. This reverts commit 5cccb249. Bug: 67930353 Change-Id: I67e0912a6795b3715a3321d3fe5147f49cebc9b5
-
Treehugger Robot authored
-
- Oct 17, 2017
-
-
Treehugger Robot authored
-
Steven Moreland authored
Now hwservicemanager can send ctl.interface_start messages to init. Note that 'set_prop(ctl.*, "foo")' maps to property context for ctl.foo. Bug: 64678982 Test: hwservicemanager can start interfaces Change-Id: I9ab0bacd0c33edb0dcc4186fa0b7cc28fd8d2f30
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Addresses the following test failure: system/extras/tests/kernel.config/nfs_test.cpp:24: Failure Value of: android::base::ReadFileToString("/proc/filesystems", &fs) Actual: false Expected: true Denial: avc: denied { read } for name="filesystems" dev="proc" scontext=u:r:shell:s0 tcontext=u:object_r:proc_filesystems:s0 tclass=file Bug: 67862327 Test: build Change-Id: I9ada5404987cb474968afc8cb8d96137ee36c68d
-