Skip to content
Snippets Groups Projects
  1. Jan 27, 2016
  2. Jan 26, 2016
    • SimHyunYong's avatar
      Using r_dir_file macro in domain.te · 093ea6fb
      SimHyunYong authored
      r_dir_file(domain, self)
      
      allow domain self:dir r_dir_perms;
      allow domain self:lnk_file r_file_perms;
      allow domain self:file r_file_perms;
      
      te_macros
      define(`r_dir_file', `
      allow $1 $2:dir r_dir_perms;
      allow $1 $2:{ file lnk_file } r_file_perms;
      ')
      
      Change-Id: I7338f63a1eaa8ca52cd31b51ce841e3dbe46ad4f
      093ea6fb
    • Jeffrey Vander Stoep's avatar
    • James Hawkins's avatar
    • James Hawkins's avatar
      bootstat: Fix the SELinux policy after removing domain_deprecated. · 2e8d71c3
      James Hawkins authored
      * Allow reading /proc.
      
      type=1400 audit(1453834004.239:7): avc: denied { read } for pid=1305
      comm="bootstat" name="uptime" dev="proc" ino=4026536600
      scontext=u:r:bootstat:s0 tcontext=u:object_r:proc:s0 tclass=file
      permissive=0
      
      * Define domain for the /system/bin/bootstat file.
      
      init: Service exec 4 (/system/bin/bootstat) does not have a SELinux
      domain defined.
      
      Bug: 21724738
      Change-Id: I4baa2fa7466ac35a1ced79776943c07635ec9804
      2e8d71c3
    • SimHyunYong's avatar
      Delete policy it is alread included in binder_call macros. · 7171232c
      SimHyunYong authored
      define(`binder_call', `
      allow $1 $2:binder { call transfer };
      allow $2 $1:binder transfer;
      allow $1 $2:fd use;
      ')
      
      binder_call(surfaceflinger, appdomain)
      binder_call(surfaceflinger, bootanim)
      
      it is alread include these policy.. so I can delete these policy!
      allow surfaceflinger appdomain:fd use;
      allow surfaceflinger bootanim:fd use;
      7171232c
    • Jeffrey Vander Stoep's avatar
    • Tao Bao's avatar
      Merge "Allow update_engine to use Binder IPC." · 6899e0a3
      Tao Bao authored
      6899e0a3
    • SimHyunYong's avatar
      Delete duplicated policy, it is already include in app.te. · 5ba9af23
      SimHyunYong authored
      allow appdomain keychain_data_file:dir r_dir_perms;
      allow appdomain keychain_data_file:file r_file_perms;
      5ba9af23
    • Tao Bao's avatar
      Allow update_engine to use Binder IPC. · dce317cf
      Tao Bao authored
      Register service with servicemanager and name the context.
      
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      
      Also allow priv_app to communicate with update_engine.
      
      avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
      
      Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
      dce317cf
    • dcashman's avatar
      Add adbd socket perms to system_server. · b037a6c9
      dcashman authored
      Commit 2fdeab37 added ability to debug
      over adbd for zygote-spawned apps, required by removal of domain_deprecated
      from untrusted_app.  This functionality is a core debugabble component
      of the android runtime, so it is needed by system_server as well.
      
      Bug: 26458796
      Change-Id: I29f5390122b3644449a5c3dcf4db2d0e969f6a9a
      b037a6c9
  3. Jan 25, 2016
  4. Jan 23, 2016
    • Nick Kralevich's avatar
      app.te: grant /system dir/file/symlink read · 5c8854ab
      Nick Kralevich authored
      Renderscript needs the ability to read directories on
      /system. Allow it and file/symlink read access.
      
      Addresses the following denials:
        RenderScript: Invoking /system/bin/ld.mc with args '/system/bin/ld.mc -shared -nostdlib
          /system/lib64/libcompiler_rt.so -mtriple=aarch64-none-linux-gnueabi
          --library-path=/system/vendor/lib64 --library-path=/system/lib64
          -lRSDriver -lm -lc
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/primitives.o
          -o
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/librs.primitives.so'
        ld.mc   : type=1400 audit(0.0:1340): avc: denied { read } for name="lib64" dev="mmcblk0p24" ino=212 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        ld.mc   : type=1400 audit(0.0:1341): avc: denied { read } for name="lib64" dev="mmcblk0p29" ino=1187 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        RenderScript: Child process "/system/bin/ld.mc" terminated with status 256
      
      Change-Id: I9fb989f66975ed553dbc0c49e9c5b5e5bc45b3c3
      5c8854ab
  5. Jan 22, 2016
    • dcashman's avatar
      Remove domain_deprecated from untrusted_app. · cbf7ba18
      dcashman authored
      Bug: 22032619
      Change-Id: Iaa192f98df3128da5e11ce1fd3cf9d1a597fedf5
      cbf7ba18
    • dcashman's avatar
      Temporarily allow untrusted_app to read proc files. · 2193f766
      dcashman authored
      Address the following denial:
      01-22 09:15:53.998  5325  5325 W ChildProcessMai: type=1400 audit(0.0:44): avc: denied { read } for name="meminfo" dev="proc" ino=4026535444 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0
      
      Change-Id: Id2db5ba09dc9de58e6da7c213d4aa4657c6e655c
      2193f766
    • James Hawkins's avatar
    • dcashman's avatar
      Allow access to /dev/ion and proc_net dir. · 8666bf25
      dcashman authored
      Address the following:
      01-21 13:35:41.147  5896  5896 W ndroid.music:ui: type=1400 audit(0.0:22): avc: denied { read } for name="ion" dev="tmpfs" ino=1237 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0
      01-21 13:35:41.152  5896  5896 E qdmemalloc: open_device: Failed to open ion device - Permission denied
      01-21 13:35:41.152  5896  5896 E qdgralloc: Could not mmap handle 0x7f827d7260, fd=55 (Permission denied)
      01-21 13:35:41.152  5896  5896 E qdgralloc: gralloc_register_buffer: gralloc_map failed
      
      and
      
      01-22 08:58:47.667  7572  7572 W Thread-23: type=1400 audit(0.0:186): avc: denied { search } for name="xt_qtaguid" dev="proc" ino=4026535741 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=dir permissive=0
      01-22 08:58:47.671  7498  7572 I qtaguid : Untagging socket 68 failed errno=-13
      01-22 08:58:47.671  7498  7572 W NetworkManagementSocketTagger: untagSocket(68) failed with errno -13
      
      Change-Id: Id4e253879fe0f6daadd04d148a257a10add68d38
      8666bf25
    • James Hawkins's avatar
      bootstat: Implement the SELinux policy to allow reading/writing to · 39c198ac
      James Hawkins authored
      /data/misc/bootstat.
      
      BUG: 21724738
      Change-Id: I2789f57cc8182af1a7c33672ef82297f32f54e2e
      39c198ac
    • Jeffrey Vander Stoep's avatar
      e1224de0
    • Jeff Vander Stoep's avatar
      Remove domain_deprecated from sdcard domains · 0c7bc58e
      Jeff Vander Stoep authored
      Remove from blkid, blkid_untrusted, fsck, fsck_untrusted, sdcardd and
      sgdisk.
      
      Tested by adding external sdcard with and without
      "adb shell sm set-force-adoptable true" command.
      
      Address the following denials:
      avc: denied { read } for name="swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { read } for name="filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Change-Id: I097e2ba5205e43f8ee613dae063f773a35ce3d73
      0c7bc58e
  6. Jan 21, 2016
    • Jeff Vander Stoep's avatar
      vold launched e2fsck must run in fsck domain · 67d9932c
      Jeff Vander Stoep authored
      Bug: 22821100
      Change-Id: I549abfd31f7286ad50be3adeadaf559816c0ee38
      67d9932c
    • Jeffrey Vander Stoep's avatar
    • dcashman's avatar
      Allow domains to stat filesystems. · fcea7263
      dcashman authored
      Address the following denials:
      01-21 12:44:53.704  4595  4595 W ndroid.calendar: type=1400 audit(0.0:21): avc: denied { getattr } for name="/" dev="dm-0" ino=2 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:labeledfs:s0 tclass=filesystem permissive=0
      01-21 12:45:23.177  5544  5544 W roid.music:main: type=1400 audit(0.0:46): avc: denied { getattr } for name="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=filesystem permissive=0
      7618 W .android.chrome: type=1400 audit(0.0:413): avc: denied { getattr } for path="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=0
      
      01-21 12:44:53.709  4595  4595 D AndroidRuntime: Shutting down VM
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: FATAL EXCEPTION: main
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: Process: com.google.android.calendar, PID: 4595
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: java.lang.RuntimeException: Unable to get provider com.google.android.syncadapters.calendar.timely.TimelyProvider: java.lang.IllegalArgumentException: Invalid path: /data
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: 	at android.app.ActivityThread.installProvider(ActivityThread.java:5550)
      ...
      
      Change-Id: I0e9d65438d031e19c9abc5dca8969ed4356437a0
      fcea7263
    • Jeff Vander Stoep's avatar
      fsck: allow e2fsck to stat swap_block_device · d644f260
      Jeff Vander Stoep authored
      In libext2fs ext2fs_check_mount_point() calls is_swap_device() to
      verify that a device is swap before setting the EXT2_MF_SWAP mount
      flag.
      
      Addresses:
      avc: denied { getattr } for path="/dev/block/zram0" dev="tmpfs" ino=9951
      scontext=u:r:fsck:s0 tcontext=u:object_r:swap_block_device:s0 tclass=blk_file
      
      Bug: 22821100
      Change-Id: Ic7a1b6f83b34a40bf4bd35a1564300c58ca27089
      d644f260
    • Jeffrey Vander Stoep's avatar
      352e6354
    • Jeff Vander Stoep's avatar
      vold: allow execute cp and rm · d1f8f731
      Jeff Vander Stoep authored
      Used in system/vold/MoveTask.cpp
      
      Addresses:
      avc: denied { execute } for name="toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      avc: denied { read open } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      avc: denied { execute_no_trans } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      
      Change-Id: I2eb6288aaed510ae5be0f3605088ace6b865ef83
      d1f8f731
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      gpsd: remove domain_deprecated · 540ea534
      Jeff Vander Stoep authored
      Only used in AOSP by flounder. No denials when running Google Maps.
      
      Change-Id: I9902c263016b4d38f1b3ed0be0bc7c4cd17ee471
      540ea534
  7. Jan 20, 2016
Loading