Skip to content
Snippets Groups Projects
  1. Nov 21, 2017
  2. Nov 20, 2017
    • Vishnu Nair's avatar
      Allow system_server to remove files in /data/misc/wmtrace/* · df8d4b87
      Vishnu Nair authored
      Bug: 64831661
      Test: adb shell cmd window tracing start && adb shell cmd window tracing stop
      Test: adb shell su root dmesg | grep 'avc: '
      Change-Id: I1578aac9e102246ec722c78a6e9efb5581259d81
      df8d4b87
    • Nick Kralevich's avatar
      Make /proc/sys/kernel/random available to everyone am: 9d9c370f · bb7f4b64
      Nick Kralevich authored
      am: 93760664
      
      Change-Id: Ib76e6e19c62bd37e09568993aec0e00be2ef18e0
      bb7f4b64
    • Nick Kralevich's avatar
      Make /proc/sys/kernel/random available to everyone · 93760664
      Nick Kralevich authored
      am: 9d9c370f
      
      Change-Id: I9499a44812b32f7f2cde3d069722d442d21ad6da
      93760664
    • Nick Kralevich's avatar
      Make /proc/sys/kernel/random available to everyone · 9d9c370f
      Nick Kralevich authored
      Similar to the way we handle /dev/random and /dev/urandom, make
      /proc/sys/kernel/random available to everyone.
      
        hostname:/proc/sys/kernel/random # ls -laZ
        total 0
        dr-xr-xr-x 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 .
        dr-xr-xr-x 1 root root u:object_r:proc:s0        0 2017-11-20 18:32 ..
        -r--r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 boot_id
        -r--r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 entropy_avail
        -r--r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 poolsize
        -rw-r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 read_wakeup_threshold
        -rw-r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 urandom_min_reseed_secs
        -r--r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 uuid
        -rw-r--r-- 1 root root u:object_r:proc_random:s0 0 2017-11-20 19:02 write_wakeup_threshold
      
      boot_id (unique random number per boot) is commonly used by
      applications, as is "uuid". As these are random numbers, no sensitive
      data is leaked. The other files are useful to allow processes to
      understand the state of the entropy pool, and should be fairly benign.
      
      Addresses the following denial:
      
        type=1400 audit(0.0:207): avc: denied { read } for name="boot_id"
        dev="proc" ino=76194 scontext=u:r:untrusted_app_25:s0:c512,c768
        tcontext=u:object_r:proc:s0 tclass=file permissive=0
      
      Bug: 69294418
      Test: policy compiles.
      Change-Id: Ieeca1c654ec755123e19b4693555990325bd58cf
      9d9c370f
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy am: d4785c37 · f9108496
      Jeff Vander Stoep authored
      am: 497e7aeb
      
      Change-Id: I85c0ecaeabf37362b84497055db441aa64c92eb0
      f9108496
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · 497e7aeb
      Jeff Vander Stoep authored
      am: d4785c37
      
      Change-Id: I41603590882cb4d70cb1636af5902edad1af0118
      497e7aeb
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · d4785c37
      Jeff Vander Stoep authored
      Sharing data folders by path will be disallowed because it violates
      the approved API between platform and vendor components tested by
      VTS. Move all violating permissions from core selinux policy to
      device specific policy so that we can exempt existing devices from
      the ban and enforce it on new devices.
      
      Bug: 34980020
      Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint
          and Play movies on Marlin and Taimen.
      Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye
      
      Change-Id: Ib6fc9cf1403e74058aaae5a7b0784922f3172b4e
      d4785c37
  3. Nov 17, 2017
Loading