Skip to content
Snippets Groups Projects
  1. Jan 22, 2016
    • Jeff Vander Stoep's avatar
      Remove domain_deprecated from sdcard domains · 0c7bc58e
      Jeff Vander Stoep authored
      Remove from blkid, blkid_untrusted, fsck, fsck_untrusted, sdcardd and
      sgdisk.
      
      Tested by adding external sdcard with and without
      "adb shell sm set-force-adoptable true" command.
      
      Address the following denials:
      avc: denied { read } for name="swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/swaps" dev="proc" ino=4026536590 scontext=u:r:fsck:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { read } for name="filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { open } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: denied { getattr } for path="/proc/filesystems" dev="proc" ino=4026536591 scontext=u:r:blkid:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Change-Id: I097e2ba5205e43f8ee613dae063f773a35ce3d73
      0c7bc58e
  2. Jan 21, 2016
  3. Jan 20, 2016
  4. Jan 19, 2016
    • Jeffrey Vander Stoep's avatar
      589ffaf6
    • Rubin Xu's avatar
    • Rubin Xu's avatar
      SELinux rule for ro.device_owner and persist.logd.security · 0c8286fe
      Rubin Xu authored
      They are introduced for the device owner process logging feature.
      That is, for enterprise-owned devices with device owner app provisioned,
      the device owner may choose to turn on additional device-wide logging for
      auditing and intrusion detection purposes. Logging includes histories of
      app process startup, commands issued over ADB and lockscreen unlocking
      attempts. These logs will available to the device owner for analysis,
      potentially shipped to a remote server if it chooses to.
      
      ro.device_owner will be a master switch to turn off logging, if the device
      has no device owner provisioned. persist.logd.security is a switch that
      device owner can toggle (via DevicePoliyManager) to enable/disable logging.
      Writing to both properties should be only allowed by the system server.
      
      Bug: 22860162
      Change-Id: Iabfe2347b094914813b9d6e0c808877c25ccd038
      0c8286fe
  5. Jan 16, 2016
  6. Jan 15, 2016
  7. Jan 14, 2016
    • Jeffrey Vander Stoep's avatar
      5de7574a
    • Jeffrey Vander Stoep's avatar
      Revert "fc_sort: initial commit" · b1fb7e40
      Jeffrey Vander Stoep authored
      Breaks builds with no device specific policy.
      
      Bug: 26568553
      This reverts commit 29d14688.
      
      Change-Id: If9254d4ad3f104a96325beedebc05dd22664084a
      b1fb7e40
    • William Roberts's avatar
      fc_sort: add NOTICE file · c68a277f
      William Roberts authored
      
      Change-Id: I0e63f90cafc5b1ca9cc112e852e172046b16a17e
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      c68a277f
    • Jeffrey Vander Stoep's avatar
      Merge "fc_sort: initial commit" · 2dea4525
      Jeffrey Vander Stoep authored
      2dea4525
    • Nick Kralevich's avatar
      drop dhcp auditallow · c29b2fc4
      Nick Kralevich authored
      toolbox_exec is executed by dhcpcd-run-hooks.
      
      Addresses the following auditallow log spam:
      
        avc: granted { read open } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read } for comm="setprop" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute } for comm="dhcpcd-run-hook" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute_no_trans } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read execute } for comm="setprop" path="/system/bin/toybox" dev="dm-0" ino=639 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
      
      Change-Id: Ib83c291961a5573397830032a67a2f6861ae2e71
      c29b2fc4
  8. Jan 13, 2016
  9. Jan 12, 2016
Loading