Skip to content
Snippets Groups Projects
  1. Jan 02, 2014
  2. Dec 24, 2013
  3. Dec 20, 2013
  4. Dec 19, 2013
    • Nick Kralevich's avatar
      vold: allow wakelocks, fsck logs · 3753c816
      Nick Kralevich authored
      When encrypting a device, vold tries to acquire a wake lock,
      to prevent the device from sleeping. Add an allow rule.
      
      After booting with a freshly encrypted device, fsck logs data to
      /dev/fscklogs/log . Add an allow rule.
      
      Addresses the following denials.
      
      wake lock:
      
      <5>[  372.401015] type=1400 audit(1387488823.195:6): avc:  denied  { read write } for  pid=143 comm="vold" name="wake_lock" dev="sysfs" ino=69 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file
      <5>[  127.274556] type=1400 audit(1387494536.080:8): avc:  denied  { open } for  pid=140 comm="vold" name="wake_lock" dev="sysfs" ino=69 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file
      
      fsck logging:
      
      <5>[   44.759122] type=1400 audit(1387489522.460:6): avc:  denied  { search } for  pid=132 comm="vold" name="fscklogs" dev="tmpfs" ino=3216 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.559964] type=1400 audit(1387495221.265:6): avc:  denied  { write } for  pid=132 comm="vold" name="fscklogs" dev="tmpfs" ino=3216 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.560081] type=1400 audit(1387495221.265:7): avc:  denied  { add_name } for  pid=132 comm="vold" name="log" scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.560244] type=1400 audit(1387495221.265:8): avc:  denied  { create } for  pid=132 comm="vold" name="log" scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      <5>[   28.560383] type=1400 audit(1387495221.265:9): avc:  denied  { write open } for  pid=132 comm="vold" name="log" dev="tmpfs" ino=5898 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      <5>[   28.582520] type=1400 audit(1387495221.285:10): avc:  denied  { getattr } for  pid=132 comm="vold" path="/dev/fscklogs/log" dev="tmpfs" ino=5898 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      
      Change-Id: I09fbe73c9d4955578c16fece4f3b84269eed78b5
      3753c816
    • Nick Kralevich's avatar
      am ddd5ebf8: am 13e44ec7: allow system_server block_suspend · 4f559fb7
      Nick Kralevich authored
      * commit 'ddd5ebf8':
        allow system_server block_suspend
      4f559fb7
    • Nick Kralevich's avatar
      am 13e44ec7: allow system_server block_suspend · ddd5ebf8
      Nick Kralevich authored
      * commit '13e44ec7':
        allow system_server block_suspend
      ddd5ebf8
    • Nick Kralevich's avatar
      allow system_server block_suspend · 13e44ec7
      Nick Kralevich authored
      I'm only seeing this denial on one device (manta), but it feels like
      it should be part of the generic policy. I don't understand
      why it's happening on only one device.
      
      Addresses the following denial:
      
      14.711671   type=1400 audit(1387474628.570:6): avc:  denied  { block_suspend } for  pid=533 comm="InputReader" capability=36  scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=capability2
      
      Change-Id: If4b28b6f42ca92c0e2cacfad75c8cbe023b0fa47
      13e44ec7
    • Stephen Smalley's avatar
      Confine sdcardd, but leave it permissive for now. · 15abc950
      Stephen Smalley authored
      
      Change-Id: I1eba1535d650a09ee7640cb7f3664202be4a0a55
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      15abc950
    • Nick Kralevich's avatar
      am 58336fc6: am 815e9813: Merge "Make bluetooth, nfc, radio and shell adb-installable" · d3c526a1
      Nick Kralevich authored
      * commit '58336fc6':
        Make bluetooth, nfc, radio and shell adb-installable
      d3c526a1
    • Nick Kralevich's avatar
      am 815e9813: Merge "Make bluetooth, nfc, radio and shell adb-installable" · 58336fc6
      Nick Kralevich authored
      * commit '815e9813':
        Make bluetooth, nfc, radio and shell adb-installable
      58336fc6
    • Nick Kralevich's avatar
    • Takeshi Aimi's avatar
      Make bluetooth, nfc, radio and shell adb-installable · f5e90004
      Takeshi Aimi authored
      bluetooth, nfc, radio and shell are not explicitly declared
      in installd.te. This prevents applications in those group
      from upgrading by "adb install -r".
      
      You can reproduce the issue by following step:
       1. adb pull /system/priv-app/Shell.apk
       2. adb install -r Shell.apk
       3. install failed with the error log blow
      
      [Error in logcat]
      E/installd(  338): couldn't symlink directory '/data/data/com.android.shell/lib' -> '/data/app-lib/com.android.shell-1': Permission denied
      E/installd(  338): couldn't symlink directory '/data/data/com.android.shell/lib' -> '/data/app-lib/Shell': Permission denied
      
      [Error in dmesg]
      <5>[  112.053301] type=1400 audit(1387412796.071:10): avc:  denied  { create } for  pid=337 comm="installd" name="lib" scontext=u:r:installd:s0 tcontext=u:object_r:shell_data_file:s0 tclass=lnk_file
      
      This operation fails only if the app belongs to any of the
      groups specified in the commit title.
      
      Change-Id: I7572df9fb6e471fad34f61137f0eeeda4c82659d
      f5e90004
  5. Dec 18, 2013
    • Nick Kralevich's avatar
      Allow dumpstate to use ping. · f6bf7ef7
      Nick Kralevich authored
      Addreseses the following denials:
      
      <5>[  695.383994] type=1400 audit(1387403898.292:55): avc:  denied  { execute } for  pid=5187 comm="dumpstate" name="ping" dev="mmcblk0p25" ino=213 scontext=u:r:dumpstate:s0 tcontext=u:object_r:ping_exec:s0 tclass=file
      <5>[  695.384727] type=1400 audit(1387403898.292:56): avc:  denied  { read open } for  pid=5187 comm="dumpstate" name="ping" dev="mmcblk0p25" ino=213 scontext=u:r:dumpstate:s0 tcontext=u:object_r:ping_exec:s0 tclass=file
      <5>[  695.385418] type=1400 audit(1387403898.292:57): avc:  denied  { execute_no_trans } for  pid=5187 comm="dumpstate" path="/system/bin/ping" dev="mmcblk0p25" ino=213 scontext=u:r:dumpstate:s0 tcontext=u:object_r:ping_exec:s0 tclass=file
      <5>[  695.391978] type=1400 audit(1387403898.302:58): avc:  denied  { create } for  pid=5187 comm="ping" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=rawip_socket
      <5>[  695.393193] type=1400 audit(1387403898.302:59): avc:  denied  { setopt } for  pid=5187 comm="ping" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=rawip_socket
      <5>[  695.393753] type=1400 audit(1387403898.302:60): avc:  denied  { getopt } for  pid=5187 comm="ping" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=rawip_socket
      <5>[  695.394886] type=1400 audit(1387403898.302:61): avc:  denied  { write } for  pid=5187 comm="ping" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=rawip_socket
      <5>[  695.400693] type=1400 audit(1387403898.312:62): avc:  denied  { read } for  pid=5187 comm="ping" lport=4 scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=rawip_socket
      
      Change-Id: If9a790725ec0ba1ca6cb5c9a8ed85288580940e8
      f6bf7ef7
    • Nick Kralevich's avatar
      am b48b52c6: am b63e485b: Merge "Confine shell domain in -user builds only." · f1611ccf
      Nick Kralevich authored
      * commit 'b48b52c6':
        Confine shell domain in -user builds only.
      f1611ccf
    • Stephen Smalley's avatar
      am b423b569: am 59469370: Add rules to permit CTS security-related tests to run. · 18e75ca4
      Stephen Smalley authored
      * commit 'b423b569':
        Add rules to permit CTS security-related tests to run.
      18e75ca4
    • Nick Kralevich's avatar
      am b63e485b: Merge "Confine shell domain in -user builds only." · b48b52c6
      Nick Kralevich authored
      * commit 'b63e485b':
        Confine shell domain in -user builds only.
      b48b52c6
    • Stephen Smalley's avatar
      am 59469370: Add rules to permit CTS security-related tests to run. · b423b569
      Stephen Smalley authored
      * commit '59469370':
        Add rules to permit CTS security-related tests to run.
      b423b569
Loading