- Jan 26, 2016
-
-
Arunesh Mishra authored
In the same process as voiceinteraction. Please see related CL ag/852049 Bug: 22860713 Change-Id: I43ebfdba2aafb151dd7db0814570027e1164508a
-
- Jan 16, 2016
-
-
Nick Kralevich authored
am: 563b2bfc * commit '563b2bfc': domain_deprecated.te: drop cache_recovery_file access
-
Nick Kralevich authored
am: 8632b9e4 * commit '8632b9e4': domain_deprecated.te: drop cache_recovery_file access
-
Nick Kralevich authored
-
Nick Kralevich authored
am: 7a8631c2 * commit '7a8631c2': priv_app.te: drop auditallows on cache_recovery_file
-
Nick Kralevich authored
am: e5005549 * commit 'e5005549': kernel.te: drop allow kernel untrusted_app:fd use;
-
Nick Kralevich authored
am: 4cd2f530 * commit '4cd2f530': priv_app.te: drop auditallows on cache_recovery_file
-
Nick Kralevich authored
am: 527d29a8 * commit '527d29a8': kernel.te: drop allow kernel untrusted_app:fd use;
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
am: eb8f8768 * commit 'eb8f8768': vold.te: drop allow vold toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: 2309ef8f * commit '2309ef8f': vold.te: drop allow vold toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
auditallow says not needed. Change-Id: Iafa048377e159ca3c7cc1f31653002c41ef9ef2b
-
Nick Kralevich authored
auditallow says not needed. Change-Id: If44f64aeb5d0be78fd166d1b3eee298c5f7c860d
-
Nick Kralevich authored
This is actually used. Addresses the following SELinux audit logs: avc: granted { create } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file avc: granted { add_name } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir avc: granted { write } for comm="Thread-157" path="/cache/recovery/uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file avc: granted { write } for comm="Thread-157" path="/cache/recovery/command" dev="mmcblk0p38" ino=23 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file avc: granted { setattr } for comm="Thread-157" name="uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file Change-Id: Idab00ebc8eacd7d8bb793b9342249227f91986a1
-
Nick Kralevich authored
auditallow says it's not used. Bug: 25331459 Change-Id: Ic414efcd0a3be6d744ab66382c20f0ea4c9ea116
-
- Jan 15, 2016
-
-
Jeff Vander Stoep authored
camera_device didn't really offer much in terms of control considering that most domains that need camera_device, also need video_device and vice versa. Thus, drop camera_device from the policy. Change-Id: If438610ac6998399719ab375210c023320d0b7ed
-
Jeffrey Vander Stoep authored
am: 1ac35736 * commit '1ac35736': camera_device: remove type and add typealias
-
Jeffrey Vander Stoep authored
am: af77ab6b * commit 'af77ab6b': fc_sort: initial commit checkfc: do not die on 0 length fc's
-
Jeffrey Vander Stoep authored
am: c15e1036 * commit 'c15e1036': camera_device: remove type and add typealias
-
Jeffrey Vander Stoep authored
am: 87a73f19 * commit '87a73f19': fc_sort: initial commit checkfc: do not die on 0 length fc's
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
* changes: fc_sort: initial commit checkfc: do not die on 0 length fc's
-
Nick Kralevich authored
am: 3920e7af * commit '3920e7af': adbd.te: remove allow adbd toolbox_exec:file rx_file_perms
-
Nick Kralevich authored
am: c4180ccf * commit 'c4180ccf': ppp.te: Remove allow ppp toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: 92e7d68a * commit '92e7d68a': netd.te: Remove allow netd toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: eed6bbdc * commit 'eed6bbdc': adbd.te: remove allow adbd toolbox_exec:file rx_file_perms
-
Nick Kralevich authored
am: bc301caa * commit 'bc301caa': ppp.te: Remove allow ppp toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: 362cc6ef * commit '362cc6ef': racoon.te: Remove allow racoon toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: 24739a6a * commit '24739a6a': netd.te: Remove allow netd toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
am: 2c109405 * commit '2c109405': racoon.te: Remove allow racoon toolbox_exec:file rx_file_perms;
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
auditallow says never used. Change-Id: I789f32bd7d2bbfc583a12bf8a05662e812f09a38
-
Nick Kralevich authored
no SELinux denials from auditallow Change-Id: Ied61f7f97b148b1c10d0f71e9ab30c136a123738
-
Nick Kralevich authored
auditallow says no denials. Change-Id: Ib4e38f5393d3f3ba67277017abc848f5e7c04efd
-
Nick Kralevich authored
auditallow says never used. Change-Id: I6a3f82740bfecf483e0ccbb528b7218af36d37b8
-
William Roberts authored
Ordering matters in fc files; the last match wins. In builds where many BOARD_SEPOLICY_DIRS are set, the order of that list becomes increasingly important in order to maintain a cohesive built file_contexts. To correct this, we sort the device specific file_contexts entries with the upstream fc_sort tool. Change-Id: I3775eae11bfa5905cad0d02a0bf26c76ac03437c Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
William Roberts authored
Checkfc was treating 0 size fc files as a fatal error. An empty fc file should be treated as "nothing to check" so long as the -e option is passed. We add this option, so we don't allow empty file_context files to pass CTS checking. Change-Id: Ibca6bd948a13389e10c605d613acc48c5504443e Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-