Skip to content
Snippets Groups Projects
  1. Jan 27, 2016
    • Jeff Vander Stoep's avatar
      zygote: grant perms from domain_deprecated · e52fff83
      Jeff Vander Stoep authored
      In preparation of removing permissions from domain_deprecated.
      
      Addresses:
      avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      
      Change-Id: I5b505ad386a445113bc0a1bb35d4f88f7761c048
      e52fff83
  2. Jan 26, 2016
  3. Jan 25, 2016
  4. Jan 23, 2016
    • Nick Kralevich's avatar
      app.te: grant /system dir/file/symlink read · 5c8854ab
      Nick Kralevich authored
      Renderscript needs the ability to read directories on
      /system. Allow it and file/symlink read access.
      
      Addresses the following denials:
        RenderScript: Invoking /system/bin/ld.mc with args '/system/bin/ld.mc -shared -nostdlib
          /system/lib64/libcompiler_rt.so -mtriple=aarch64-none-linux-gnueabi
          --library-path=/system/vendor/lib64 --library-path=/system/lib64
          -lRSDriver -lm -lc
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/primitives.o
          -o
          /data/user/0/com.android.rs.test/code_cache/com.android.renderscript.cache/librs.primitives.so'
        ld.mc   : type=1400 audit(0.0:1340): avc: denied { read } for name="lib64" dev="mmcblk0p24" ino=212 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        ld.mc   : type=1400 audit(0.0:1341): avc: denied { read } for name="lib64" dev="mmcblk0p29" ino=1187 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
        RenderScript: Child process "/system/bin/ld.mc" terminated with status 256
      
      Change-Id: I9fb989f66975ed553dbc0c49e9c5b5e5bc45b3c3
      5c8854ab
  5. Jan 22, 2016
    • dcashman's avatar
      Remove domain_deprecated from untrusted_app. · cbf7ba18
      dcashman authored
      Bug: 22032619
      Change-Id: Iaa192f98df3128da5e11ce1fd3cf9d1a597fedf5
      cbf7ba18
    • dcashman's avatar
      Temporarily allow untrusted_app to read proc files. · 2193f766
      dcashman authored
      Address the following denial:
      01-22 09:15:53.998  5325  5325 W ChildProcessMai: type=1400 audit(0.0:44): avc: denied { read } for name="meminfo" dev="proc" ino=4026535444 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0
      
      Change-Id: Id2db5ba09dc9de58e6da7c213d4aa4657c6e655c
      2193f766
    • James Hawkins's avatar
    • dcashman's avatar
      Allow access to /dev/ion and proc_net dir. · 8666bf25
      dcashman authored
      Address the following:
      01-21 13:35:41.147  5896  5896 W ndroid.music:ui: type=1400 audit(0.0:22): avc: denied { read } for name="ion" dev="tmpfs" ino=1237 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0
      01-21 13:35:41.152  5896  5896 E qdmemalloc: open_device: Failed to open ion device - Permission denied
      01-21 13:35:41.152  5896  5896 E qdgralloc: Could not mmap handle 0x7f827d7260, fd=55 (Permission denied)
      01-21 13:35:41.152  5896  5896 E qdgralloc: gralloc_register_buffer: gralloc_map failed
      
      and
      
      01-22 08:58:47.667  7572  7572 W Thread-23: type=1400 audit(0.0:186): avc: denied { search } for name="xt_qtaguid" dev="proc" ino=4026535741 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc_net:s0 tclass=dir permissive=0
      01-22 08:58:47.671  7498  7572 I qtaguid : Untagging socket 68 failed errno=-13
      01-22 08:58:47.671  7498  7572 W NetworkManagementSocketTagger: untagSocket(68) failed with errno -13
      
      Change-Id: Id4e253879fe0f6daadd04d148a257a10add68d38
      8666bf25
    • James Hawkins's avatar
      bootstat: Implement the SELinux policy to allow reading/writing to · 39c198ac
      James Hawkins authored
      /data/misc/bootstat.
      
      BUG: 21724738
      Change-Id: I2789f57cc8182af1a7c33672ef82297f32f54e2e
      39c198ac
    • Jeffrey Vander Stoep's avatar
      e1224de0
    • Jeff Vander Stoep's avatar
      Remove domain_deprecated from sdcard domains · 0c7bc58e
      Jeff Vander Stoep authored
      Remove from blkid, blkid_untrusted, fsck, fsck_untrusted, sdcardd and
      sgdisk.
      
      Tested by adding external sdcard with and without
      "adb shell sm set-force-adoptable true" command.
      
      Address the following denials:
      avc: denied { read } for name="swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { read } for name="filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Change-Id: I097e2ba5205e43f8ee613dae063f773a35ce3d73
      0c7bc58e
  6. Jan 21, 2016
    • Jeff Vander Stoep's avatar
      vold launched e2fsck must run in fsck domain · 67d9932c
      Jeff Vander Stoep authored
      Bug: 22821100
      Change-Id: I549abfd31f7286ad50be3adeadaf559816c0ee38
      67d9932c
    • Jeffrey Vander Stoep's avatar
    • dcashman's avatar
      Allow domains to stat filesystems. · fcea7263
      dcashman authored
      Address the following denials:
      01-21 12:44:53.704  4595  4595 W ndroid.calendar: type=1400 audit(0.0:21): avc: denied { getattr } for name="/" dev="dm-0" ino=2 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:labeledfs:s0 tclass=filesystem permissive=0
      01-21 12:45:23.177  5544  5544 W roid.music:main: type=1400 audit(0.0:46): avc: denied { getattr } for name="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=filesystem permissive=0
      7618 W .android.chrome: type=1400 audit(0.0:413): avc: denied { getattr } for path="/" dev="rootfs" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=0
      
      01-21 12:44:53.709  4595  4595 D AndroidRuntime: Shutting down VM
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: FATAL EXCEPTION: main
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: Process: com.google.android.calendar, PID: 4595
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: java.lang.RuntimeException: Unable to get provider com.google.android.syncadapters.calendar.timely.TimelyProvider: java.lang.IllegalArgumentException: Invalid path: /data
      01-21 12:44:53.727  4595  4595 E AndroidRuntime: 	at android.app.ActivityThread.installProvider(ActivityThread.java:5550)
      ...
      
      Change-Id: I0e9d65438d031e19c9abc5dca8969ed4356437a0
      fcea7263
    • Jeff Vander Stoep's avatar
      fsck: allow e2fsck to stat swap_block_device · d644f260
      Jeff Vander Stoep authored
      In libext2fs ext2fs_check_mount_point() calls is_swap_device() to
      verify that a device is swap before setting the EXT2_MF_SWAP mount
      flag.
      
      Addresses:
      avc: denied { getattr } for path="/dev/block/zram0" dev="tmpfs" ino=9951
      scontext=u:r:fsck:s0 tcontext=u:object_r:swap_block_device:s0 tclass=blk_file
      
      Bug: 22821100
      Change-Id: Ic7a1b6f83b34a40bf4bd35a1564300c58ca27089
      d644f260
    • Jeffrey Vander Stoep's avatar
      352e6354
    • Jeff Vander Stoep's avatar
      vold: allow execute cp and rm · d1f8f731
      Jeff Vander Stoep authored
      Used in system/vold/MoveTask.cpp
      
      Addresses:
      avc: denied { execute } for name="toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      avc: denied { read open } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      avc: denied { execute_no_trans } for path="/system/bin/toolbox" dev="mmcblk0p29" ino=359 scontext=u:r:vold:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
      
      Change-Id: I2eb6288aaed510ae5be0f3605088ace6b865ef83
      d1f8f731
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      gpsd: remove domain_deprecated · 540ea534
      Jeff Vander Stoep authored
      Only used in AOSP by flounder. No denials when running Google Maps.
      
      Change-Id: I9902c263016b4d38f1b3ed0be0bc7c4cd17ee471
      540ea534
  7. Jan 20, 2016
  8. Jan 19, 2016
    • Jeffrey Vander Stoep's avatar
      589ffaf6
    • Rubin Xu's avatar
    • Rubin Xu's avatar
      SELinux rule for ro.device_owner and persist.logd.security · 0c8286fe
      Rubin Xu authored
      They are introduced for the device owner process logging feature.
      That is, for enterprise-owned devices with device owner app provisioned,
      the device owner may choose to turn on additional device-wide logging for
      auditing and intrusion detection purposes. Logging includes histories of
      app process startup, commands issued over ADB and lockscreen unlocking
      attempts. These logs will available to the device owner for analysis,
      potentially shipped to a remote server if it chooses to.
      
      ro.device_owner will be a master switch to turn off logging, if the device
      has no device owner provisioned. persist.logd.security is a switch that
      device owner can toggle (via DevicePoliyManager) to enable/disable logging.
      Writing to both properties should be only allowed by the system server.
      
      Bug: 22860162
      Change-Id: Iabfe2347b094914813b9d6e0c808877c25ccd038
      0c8286fe
  9. Jan 16, 2016
Loading