- Oct 06, 2017
-
-
Jeffrey Vander Stoep authored
-
Treehugger Robot authored
-
Tri Vo authored
Renamed this type: proc_asound_cards -> proc_asound Labeled /proc/asound/devices as proc_asound. We now use proc_asound type to label files under /proc/asound which we want to expose to system components. Bug: 66988327 Test: Pixel 2 boots, can play sound with or without headphones, and selinux denials to proc_asound are not seen. Change-Id: I453d9bfdd70eb80931ec9e80f17c8fd0629db3d0
-
Treehugger Robot authored
-
- Oct 05, 2017
-
-
Treehugger Robot authored
-
Marco Nelissen authored
-
Jeff Vander Stoep authored
FAILED: out/target/product/sailfish/obj/ETC/treble_sepolicy_tests_intermediates/treble_sepolicy_tests Error: library-path out/host/darwin-x86/lib64/libsepolwrap.so does not exist Note, fixing here instead of reverting to avoid reverting changes in CTS. Test: ctate testing on Mac Change-Id: I95f483b152d9bece1a16267cbc49eedb1f902990
-
- Oct 04, 2017
-
-
Marco Nelissen authored
so they can use MediaExtractor too. Bug: 67406992 Test: yes Change-Id: Iaacadc13b1fc032fe31eea1f3ecbbbabb741470a
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
On Marlin/Sailfish, StorageManager tests in CTS are exposing a bug where the /proc/<pid>/ns/mnt files for system_server are briefly mislabeled as "proc" instead of "system_server". Resulting in the tests failing. Temporarily re-granting access to the default label until the labeling issue can be tracked down. Repro steps: cts-tradefed run commandAndExit cts-dev -m CtsOsTestCases \ -t android.os.storage.cts.StorageManagerTest Failures: android.os.storage.cts.StorageManagerTest#testOpenProxyFileDescriptor fail: java.lang.IllegalStateException: command '58 appfuse mount 10065 959 0' failed with '400 58 Command failed' android.os.storage.cts.StorageManagerTest#testOpenProxyFileDescriptor_async fail: java.lang.IllegalStateException: command '59 appfuse mount 10065 959 1' failed with '400 59 Command failed' android.os.storage.cts.StorageManagerTest#testOpenProxyFileDescriptor_error fail: java.lang.IllegalStateException: command '60 appfuse mount 10065 959 2' failed with '400 60 Command failed' From the log: 10-04 20:41:22.972 595 604 E vold : Failed to open namespace for /proc/959/ns/mnt: Permission denied 10-04 20:41:22.967 604 604 W vold : type=1400 audit(0.0:90): avc: denied { read } for dev="proc" ino=4026534249 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 10-04 20:41:23.051 604 604 W vold : type=1400 audit(0.0:91): avc: denied { read } for dev="proc" ino=4026534249 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 10-04 20:41:23.054 595 604 E vold : Failed to open namespace for /proc/959/ns/mnt: Permission denied 10-04 20:41:23.081 604 604 W vold : type=1400 audit(0.0:92): avc: denied { read } for dev="proc" ino=4026534249 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 10-04 20:41:23.086 595 604 E vold : Failed to open namespace for /proc/959/ns/mnt: Permission denied sailfish:/ # ps -AZ | grep 959 u:r:system_server:s0 system 959 628 \ 4557136 251500 SyS_epoll_wait 70e6df822c S system_server The file labels appear to be correct when checked manually. sailfish:/ # ls -lZ /proc/959/ns/ lrwxrwxrwx 1 system system u:r:system_server:s0 0 2017-10-04 17:19 mnt -> mnt:[4026534249] lrwxrwxrwx 1 system system u:r:system_server:s0 0 2017-10-04 20:55 net -> net:[4026531906] Bug: 67049235 Test: cts-tradefed run commandAndExit cts-dev -m CtsOsTestCases \ -t android.os.storage.cts.StorageManagerTes Change-Id: Id4d200856c02c023c6f516e3f3bfa060e100086c
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Nick Kralevich authored
This functionality is being used, apparently. Addresses the following auditallow spam: type=1400 audit(0.0:1039): avc: granted { write } for comm="Chrome_ProcessL" path="/storage/emulated/0/Android/data/com.bleacherreport.android.teamstream/cache/.com.google.Chrome.sk5n91" dev="sdcardfs" ino=1877565 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0 tclass=file Test: policy compiles. Bug: 32896414 Change-Id: I627e20c38115f1d579e78ca12abfa717d32a155a
-
Nick Kralevich authored
"append" has almost the same behavior as "write". Test: policy compiles. Change-Id: I3f85108e7918766f07e03f74c3f1d8e8084042b3
-
Jeff Vander Stoep authored
avc: denied { read } for pid=446 comm="recovery" name="cmdline" dev="proc" scontext=u:r:recovery:s0 tcontext=u:object_r:proc_cmdline:s0 tclass=file Test: build Bug: 66497047 Change-Id: I9f48db88bed0d6ac76fa2808a4913857230a5d4b
-
Jeff Vander Stoep authored
Bug: 37008075 Test: build, all tests pass. Modify some attributes locally to cause tests to fail (verify that they are actually working). Change-Id: If9f9ece61dff835f38ef9c8a57f5a7baddbae5cd
-
Treehugger Robot authored
-
Tri Vo authored
-
Jeff Vander Stoep authored
This is a necessary for enforcing these tests in CTS. Bug: 37008075 Test: build Change-Id: I36b4ce71c26a0ba01cd0289fe363f0a9f7db1214 (cherry picked from commit 8d614b3f)
-
- Oct 03, 2017
-
-
Tri Vo authored
Grant update_engine access to sysfs. Ran fake ota go/manual-ab-ota, and this denial was fixed: avc: denied { read } for pid=912 comm="update_engine" name="compatible" dev="sysfs" ino=17399 scontext=u:r:update_engine:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 Test: boots with no new denials Change-Id: I8697da3af254aea1cec44d9dbb1eca18be31859c
-
Nick Kralevich authored
Duplicate of "allow domain su:fd use;" Test: policy compiles. Change-Id: I81d86a8b325d619d3ecc9450a011d6646605cab9
-
Tri Vo authored
-
Tri Vo authored
-
Etan Cohen authored
-
Treehugger Robot authored
-
Daniel Cashman authored
This reverts commit f9cd76b1. Change-Id: I4f753f3159b422fbca94be78e620bee2c39de38a
-
- Oct 02, 2017
-
-
Treehugger Robot authored
-
Tri Vo authored
Removes uncrypt access to the rest of /proc. Fixes this denial, which can be triggered from recovery_component_test: [ 142.540819] type=1400 audit(1506983074.139:23): avc: denied { read } for pid=5767 comm=uncrypt name=cmdline dev=proc ino=4026532114 scontext=u:r:uncrypt:s0 tcontext=u:object_r:proc_cmdline:s0 tclass=file permissive=0 Bug: 66497047 Test: recovery_component_test --gtest_filter=UncryptTest.* no more denials to /proc/cmdline Change-Id: If1a7630779d667d52a0cc44114ef6177982de21c
-
Dan Cashman authored
This file is necessary for using an mr1 system image in conjunction with an oc-dev vendor image. This is currently needed by GSI testing, for example. (cherry-pick of commit: 03596f28) Bug: 66358348 Test: File is included on system image. Change-Id: I3a6b7ed5edf1c07941bbf835e70f2ae8d03fee25
-
Tri Vo authored
Bug: 65643247 Test: SurfaceFlinger_test passes (except known failures) without selinux denials Change-Id: I6ce185f92e5ad64a172da7d7e12167d8da2ebed0
-
Treehugger Robot authored
-
- Sep 29, 2017
-
-
Etan Cohen authored
A parallel Wi-Fi RTT service is being added in parallel. Switch-over will occur once the new service is ready. Bug: 65014552 Test: integration tests Change-Id: Ie4b15592140462af70c7092511aee3f603aaa411
-
Treehugger Robot authored
-
- Sep 28, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: nonplat_property_contexts: use fc_sort vs sort plat_property_contexts: use fc_sort vs sort
-
Jin Qian authored
Test: adb bugreport Bug: 63629306 Change-Id: I7a366b199ddd0ec303dc25ca8c35764c5d7e3af8
-
Bowgo Tsai authored
Bug: 65570851 Test: boot sailfish Change-Id: I008bf5386595c614236de44131afcda7d3fd6d98 Merged-In: I008bf5386595c614236de44131afcda7d3fd6d98 (cherry picked from commit 82ca9c2e)
-
- Sep 27, 2017
-
-
Dan Cashman authored
(This reverts internal commit: 82ca9c2e) Test: None. Merged-in: I97ffdd48b64ef5c35267387079204512a093a356 Change-Id: I97ffdd48b64ef5c35267387079204512a093a356
-
Jeff Vander Stoep authored
Used to display kernel version in settings app. avc: denied { read } for name="version" dev="proc" scontext=u:r:system_app:s0 tcontext=u:object_r:proc_version:s0 tclass=file permissive=0 Bug: 66985744 Test: kernel version now displayed in settings app. Change-Id: I53f92f63362b900347fd393a40d70ccf5d220d30
-
William Roberts authored
sort respects locale settings, so the value of LC_ALL can affect how sort orders things. This can cause labeling issues. More information on locale and sort can be found via: * locale(1) - man 1 locale * sort(1) - man 1 sort * https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28539 Rather than deal with this locale setting use fc_sort on property contexts. This also has the side-effect of stripping comments, and thus sed can be dropped. Test: This was tested by: * comparing outputs to previous runs * compile tested *only*. Change-Id: I1e1eb4dff76f717b5f82f697e677a108abb69892 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-