Skip to content
Snippets Groups Projects
  1. Nov 16, 2017
  2. Nov 15, 2017
  3. Nov 14, 2017
    • Jeff Vander Stoep's avatar
      Add tracking bugs to crash_dump denials · 41401f47
      Jeff Vander Stoep authored
      avc: denied { search } for name="com.sf.activity" dev="sda35"
      ino=1444147 scontext=u:r:crash_dump:s0:c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir
      avc: denied { search } for comm="crash_dump64"
      name="com.android.bluetooth" dev="sda13" ino=1442292
      scontext=u:r:crash_dump:s0 tcontext=u:object_r:bluetooth_data_file:s0
      tclass=dir
      avc: denied { search } for comm="crash_dump64" name="overlay" dev="dm-1"
      ino=938 scontext=u:r:crash_dump:s0
      tcontext=u:object_r:vendor_overlay_file:s0 tclass=dir permissive=0
      
      Bug: 68705274
      Bug: 68319037
      Test: build
      Change-Id: I44075ac6bf6447d863373c97ba10eadf59d2d22f
      41401f47
    • Tianjie Xu's avatar
      Do not audit the fsetid capability for update engine · 29fc85ee
      Tianjie Xu authored
      There's a selinux denial for update_engine after go/aog/530462; the
      denial is likely due to the setgid bit of the
      update_engine_log_data_file.
      Message:
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      
      Bug: 69197466
      Test: denial message gone on sailfish.
      Change-Id: I0fdc285e4a4faa8dc37b4907484b3c79d4cc49cf
      29fc85ee
    • Xin Li's avatar
      Merge commit 'd9664064' into HEAD · c667a0ed
      Xin Li authored
      Change-Id: Icec8dfff5cff17cf1b557882db62b148a7218b98
      c667a0ed
    • Chad Brubaker's avatar
      Merge "Allow Instant/V2 apps to load code from /data/data" · ba87a9aa
      Chad Brubaker authored
      am: 7c662776
      
      Change-Id: I20f956cd6cfbd198dc8e72fb7d3bfeadeb2f09d5
      ba87a9aa
    • Treehugger Robot's avatar
  4. Nov 13, 2017
  5. Nov 10, 2017
  6. Nov 09, 2017
    • Tri Vo's avatar
      Merge changes from topic "cki_proc_init" · cec8b2cd
      Tri Vo authored
      am: aa93dad6
      
      Change-Id: I341b2a69e99c01242cbed24adfc5f51dd7ef78b5
      cec8b2cd
    • Chenbo Feng's avatar
      sepolicy: allow netd to write to qtaguid file · 185941aa
      Chenbo Feng authored
      Since all qtaguid related userspace implementation are moved into netd
      and will use netd to choose which module to run at run time. Netd module
      should be the only process can directly read/write to the ctrl file of
      qtaguid located at /proc/net/xt_qtaguid/ctrl. This sepolicy change grant
      netd the privilege to access qtaguid proc files. It also grant netd the
      permission to control trigger to turn on and off qtaguid module by write
      parameters to files under sys_fs. The file and directory related is
      properly labled.
      
      Bug: 68774956
      Bug: 30950746
      Test: qtaguid function still working after the native function is
      redirected.
      
      Change-Id: Ia6db6f16ecbf8c58f631c79c9b4893ecf2cc607b
      185941aa
Loading