Skip to content
Snippets Groups Projects
  1. Nov 20, 2017
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · 497e7aeb
      Jeff Vander Stoep authored
      am: d4785c37
      
      Change-Id: I41603590882cb4d70cb1636af5902edad1af0118
      497e7aeb
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · d4785c37
      Jeff Vander Stoep authored
      Sharing data folders by path will be disallowed because it violates
      the approved API between platform and vendor components tested by
      VTS. Move all violating permissions from core selinux policy to
      device specific policy so that we can exempt existing devices from
      the ban and enforce it on new devices.
      
      Bug: 34980020
      Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint
          and Play movies on Marlin and Taimen.
      Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye
      
      Change-Id: Ib6fc9cf1403e74058aaae5a7b0784922f3172b4e
      d4785c37
  2. Nov 17, 2017
  3. Nov 16, 2017
  4. Nov 15, 2017
  5. Nov 14, 2017
    • Jeff Vander Stoep's avatar
      Add tracking bugs to crash_dump denials · 41401f47
      Jeff Vander Stoep authored
      avc: denied { search } for name="com.sf.activity" dev="sda35"
      ino=1444147 scontext=u:r:crash_dump:s0:c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir
      avc: denied { search } for comm="crash_dump64"
      name="com.android.bluetooth" dev="sda13" ino=1442292
      scontext=u:r:crash_dump:s0 tcontext=u:object_r:bluetooth_data_file:s0
      tclass=dir
      avc: denied { search } for comm="crash_dump64" name="overlay" dev="dm-1"
      ino=938 scontext=u:r:crash_dump:s0
      tcontext=u:object_r:vendor_overlay_file:s0 tclass=dir permissive=0
      
      Bug: 68705274
      Bug: 68319037
      Test: build
      Change-Id: I44075ac6bf6447d863373c97ba10eadf59d2d22f
      41401f47
    • Tianjie Xu's avatar
      Do not audit the fsetid capability for update engine · 29fc85ee
      Tianjie Xu authored
      There's a selinux denial for update_engine after go/aog/530462; the
      denial is likely due to the setgid bit of the
      update_engine_log_data_file.
      Message:
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      
      Bug: 69197466
      Test: denial message gone on sailfish.
      Change-Id: I0fdc285e4a4faa8dc37b4907484b3c79d4cc49cf
      29fc85ee
Loading