Skip to content
Snippets Groups Projects
  1. Apr 04, 2017
  2. Apr 03, 2017
  3. Apr 02, 2017
  4. Apr 01, 2017
  5. Mar 31, 2017
    • Tom Cherry's avatar
      Grant vdc access to kmsg · e9614833
      Tom Cherry authored
      Init is no longer calling vdc with logwrapper, so it must take care of
      logging to kmsg directly.
      
      avc: denied { write } for pid=367 comm="vdc" name="kmsg" dev="tmpfs" ino=11056 scontext=u:r:vdc:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0
      
      Bug: 36278706
      Test: observe vdc logging in kmsg on boot and stderr on normal usage
      
      (cherry picked from commit bc4d3630)
      
      Change-Id: Id7bc2fa87518aa0678c09495267c9e198ca8c968
      e9614833
    • Shubang's avatar
      Add sepolicy for tv.input · c76e158c
      Shubang authored
      Test: build, flash; adb shell lshal
      Bug: 36562029
      Change-Id: If8f6d8dbd99d31e6627fa4b7c1fd4faea3b75cf2
      c76e158c
    • Jeff Vander Stoep's avatar
      domain: grant all domains access to zoneinfo · 5aebe512
      Jeff Vander Stoep authored
      /data/misc/zoneinfo is provided by libc and is considered to be
      VNDK stable. Grant read access to all domains and exempt from
      neverallow rules asserting no vendor access to core data types.
      
      Bug: 36730929
      Test: Marlin Policy builds
      Change-Id: I13766a661d6314f5393639fc20f1ab55d802f35f
      5aebe512
    • Jin Qian's avatar
      storaged: allow shell to call dumpsys storaged · a239f30f
      Jin Qian authored
      Test: adb kill-server && adb shell dumpsys storaged
      Bug: 36492915
      Change-Id: I3a1a2ad2f016ddd5770d585cae82c8be69001df9
      a239f30f
    • Chad Brubaker's avatar
    • Alex Klyubin's avatar
      Tighten restrictions on core <-> vendor socket comms · 2f6151ea
      Alex Klyubin authored
      This futher restricts neverallows for sockets which may be exposed as
      filesystem nodes. This is achieved by labelling all such sockets
      created by core/non-vendor domains using the new coredomain_socket
      attribute, and then adding neverallow rules targeting that attribute.
      
      This has now effect on what domains are permitted to do. This only
      changes neverallow rules.
      
      Test: mmm system/sepolicy
      Bug: 36577153
      
      (cherry picked from commit cf2ffdf0)
      
      Change-Id: Iffeee571a2ff61fb9515fa6849d060649636524e
      2f6151ea
    • Daniel Nicoara's avatar
      VR: Add sepolicy for VR HWC service · 6907e39a
      Daniel Nicoara authored
      VR HWC is being split out of VR Window Manager. It creates a HW binder
      interface used by SurfaceFlinger which implements the HWComposer HAL and
      a regular binder interface which will be used by a system app to receive
      the SurfaceFlinger output.
      
      Bug: b/36051907
      Test: Ran in permissive mode and ensured no permission errors show in
      logcat.
      
      Change-Id: If1360bc8fa339a80100124c4e89e69c64b29d2ae
      6907e39a
  6. Mar 30, 2017
Loading