- Aug 01, 2017
-
-
Ruchi Kandoi authored
am: 7ceea484 Change-Id: I82200626ae6a84728ce202e8f2ba829b4f3dc889
-
Ruchi Kandoi authored
am: df964950 Change-Id: I5e793a78ad471b27fdc0bb88596ab23f6ac43dc4
-
- Jul 31, 2017
-
-
Ruchi Kandoi authored
type=1400 audit(1501520483.066:14): avc: denied { write } for pid=3330 comm=4173796E635461736B202331 name="property_service" dev="tmpfs" ino=10749 scontext=u:r:nfc:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 Test: No sepolicy denials Bug: 64010793 Change-Id: I8d73e8e19cd4d0a8c61f1f184820c53e5cc2b6d6
-
- Jul 29, 2017
-
-
Jeff Vander Stoep authored
am: 4e960188 Change-Id: I5dcc335c9bc9a1546709bef874c499b9d8eff03c
-
Jeff Vander Stoep authored
am: 5c41d40e Change-Id: I6a60af407a6a95e3d48818de28619dc5ba44284f
-
- Jul 28, 2017
-
-
Jeff Vander Stoep authored
The only file in /proc/<pid>/ that is world writeable is /proc/<pid>/timerslack_ns so granting selinux write permission to a process's /proc/<pid>/ file only allows writing to timerslack_ns (unless the process is running as system UID). Addresses denials such as: avc: denied { write } for comm="Binder:1117_2" name="timerslack_ns" dev="proc" ino=27908 scontext=u:r:system_server:s0 tcontext=u:r:priv_app:s0 tclass=file permissive=1 Bug: 30675296 Test: build Change-Id: I2cee8ce73a0dc05d771881c36da2fde5411859fb
-
Jeff Vander Stoep authored
am: d22cbc8f Change-Id: I9ce4b77de5cb1e19428732824ae5ab528ac64a04
-
Jeff Vander Stoep authored
am: f1b06df3 Change-Id: I0d98e192600c94f983d7b0347715e2ba6a8b8dab
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
long live domain.te! Remove all references. Bug: 28760354 Test: build Merged-In: I99953ecc7d275fdbe8e56d8f47a27d1f9e1cc09a Change-Id: I99953ecc7d275fdbe8e56d8f47a27d1f9e1cc09a
-
Joel Galenson authored
am: 55f0ecb7 Change-Id: I8d46aa5e2b38de80ef0cd0d8028c8b2d13809b15
-
TreeHugger Robot authored
-
Tim Kryger authored
am: 4ebe609a Change-Id: I96a2b977bf125006e2453537670d1c3030872aee
-
Tim Kryger authored
am: bfbe96ac Change-Id: I12a2ed20022edf9da528f0ab5941cc5df8e418ab
-
Tim Kryger authored
-
Jeff Vander Stoep authored
am: faaf86bc -s ours Change-Id: I6ac64581e0e879c4ad077eaab748ecf33dd3a73a
-
- Jul 27, 2017
-
-
Jeff Vander Stoep authored
am: 8e589af6 Change-Id: I5d9f0e7908d62aa4a0c3e5d626ad40dd281c50b0
-
Jeff Vander Stoep authored
am: 275f6dd5 Change-Id: I02b2eb1a5bbd0cf3a4bbeffbe70e442ba4cf8ee6
-
Tim Kryger authored
avc: denied { read } for pid=1704 comm="top" name="stat" dev="proc" ino=4026532297 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=1636 comm="dumpstate" name="lcd-backlight" dev="sysfs" ino=16592 scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file permissive=0 avc: denied { call } for pid=2230 comm="dumpsys" scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0 tclass=binder permissive=0 avc: denied { create } for pid=1700 comm="ip" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_xfrm_socket permissive=0 Bug: 62410287 Bug: 35350306 Change-Id: I65be3678c64214ebeb544e0e155bce88b21adf02 Signed-off-by:
Tim Kryger <tkryger@google.com>
-
Jeff Vander Stoep authored
Clean up the remaining granted permissions in domain_deprecated. avc: granted { read open } for comm="uncrypt" path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible" dev="sysfs" ino=17591 scontext=u:r:uncrypt:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { getattr } for comm="uncrypt" path="/sys/firmware/devicetree/base/firmware/android/compatible" dev="sysfs" ino=17583 scontext=u:r:uncrypt:s0 tcontext=u:object_r:sysfs:s0 tclass=file vc: granted { read open } for comm="update_engine" path="/sys/firmware/devicetree/base/firmware/android/fstab" dev="sysfs" ino=17258 scontext=u:r:update_engine:s0 tcontext=u:object_r:sysfs:s0 tclass=dir avc: granted { getattr } for comm="update_engine" path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible" dev="sysfs" ino=17259 scontext=u:r:update_engine:s0 tcontext=u:object_r:sysfs:s0 tclass=file Bug: 28760354 Test: build Change-Id: Id318ce84894c1001361923f5205de093a15c1e6a
-
Jeffrey Vander Stoep authored
am: d7989e8b Change-Id: I1e148607abab46b1733bfeafa3faef6e250ecc47
-
Jeffrey Vander Stoep authored
am: 4fc64f2f Change-Id: I7dd6ea7bb5d767afb98a39e56214dd05d4585c93
-
Jeffrey Vander Stoep authored
-
Joel Galenson authored
Test: Built. Change-Id: Ia5f5b52e10e9411cd87901053675d9e77a622529
-
Joel Galenson authored
am: 47966cec Change-Id: If294b49998475d4cdfb4435d720a494f10325ab8
-
Joel Galenson authored
Test: I solemnly swear I tested this conflict resolution. Merged-In: Ia28707ec565a0792bc882fbffe9e8ab9968535f5 Change-Id: I1f087fe5e7a71761a16673331619f52998473b44
-
Jeff Vander Stoep authored
Relax neverallow rule restricting binder access to/from netd so that netd can export hwbinder services to vendor components. Continue to disallow app access to netd via binder. Bug: 36682246 Test: build Merged-In: I8e558ea1add6c36b966ec1da204062ea82df3f3f Change-Id: I063df6dded94d8b0f5214b2c94c4f46bdafb03d7
-
Jeff Vander Stoep authored
Relax neverallow rule restricting binder access to/from netd so that netd can export hwbinder services to vendor components. Continue to disallow app access to netd via binder. Bug: 36682246 Test: build Change-Id: I8e558ea1add6c36b966ec1da204062ea82df3f3f
-
Joel Galenson authored
This should improve performance, as file_contexts is slower than genfs_contexts. Bug: 62413700 Test: Built, flashed, and booted Sailfish. Verified that the files have the correct context and that wifi, web, and atrace work. Merged-In: Ia28707ec565a0792bc882fbffe9e8ab9968535f5 Change-Id: I9546f3af3c95e3443684ae4764881b69987611ef
-
- Jul 26, 2017
-
-
Jeff Vander Stoep authored
am: 1bc17b61 Change-Id: I333680a1cd8f6233cd6c74ef19ec5835d56b47c5
-
Jeff Vander Stoep authored
am: 5a30eadc Change-Id: I02b0984e1ecb119e2793d01a950e2e643d3ea5c8
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: 3d765cfd Change-Id: Ie2790bb100048f2dbc2ae441c9f615c85e41704d
-
Jeff Vander Stoep authored
am: 825173e3 Change-Id: Ic7acb327cf684e6b82b1d40b408c039e02c0a7fd
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Allows groups to be mounted at /dev/memcg Addresses: avc: denied { associate } for comm="init" name="memcg" scontext=u:object_r:cgroup:s0 tcontext=u:object_r:tmpfs:s0 tclass=filesystem permissive=0 Bug: 64067152 Test: build Change-Id: Ic8f641e841fe09c8f7fd487ed67cf0ab4860a1cc
-
Jeff Vander Stoep authored
type=1400 audit(0.0:6): avc: denied { read } for comm="Thread-5" name="cache" dev="dm-0" ino=13 scontext=u:r:system_server:s0 tcontext=u:object_r:cache_file:s0 tclass=lnk_file permissive=0 Bug: 64067152 Test: build Change-Id: Ie90c0343a834aa87b7ded41f503e05d9b63b3244
-
Jeff Vander Stoep authored
am: ad95219c Change-Id: I1c56aed1846de0742fa264c82111631b8336ce9b
-
Jeff Vander Stoep authored
am: c15d54ef Change-Id: I5b47e2ced9dd5aa92727076e4cef0cc4ebaeaf7c
-
Jeff Vander Stoep authored
Remove "granted" logspam. Grante the observed permissions to the individual processes that need them and remove the permission from domain_deprecated. avc: granted { read open } for comm="ndroid.settings" path="/proc/version" dev="proc" ino=4026532081 scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { getattr } for comm=4173796E635461736B202332 path="/proc/pagetypeinfo" dev="proc" ino=4026532129 scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read open } for comm="uncrypt" path="/proc/cmdline" dev="proc" ino=4026532072 scontext=u:r:uncrypt:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read open } for comm="update_engine" path="/proc/sys/kernel/random/boot_id" dev="proc" ino=15852829 scontext=u:r:update_engine:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read open } for comm="tiveportallogin" path="/proc/vmstat" dev="proc" ino=4026532130 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file This change is specifically not granting the following since it should not be allowed: avc: granted { read open } for comm="crash_dump64" path="/proc/filesystems" dev="proc" ino=4026532416 scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read } for comm="crash_dump64" name="filesystems" dev="proc" ino=4026532416 scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { getattr } for comm="crash_dump64" path="/proc/filesystems" dev="proc" ino=4026532416 scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file Bug: 64032843 Bug: 28760354 Test: build Change-Id: Ib309e97b6229bdf013468dca34f606c0e8da96d0
-