- Jul 06, 2017
-
-
Jeff Vander Stoep authored
am: 407e9457 Change-Id: If277928809ec2bcaf7f72ef9cba5dd5d45d333ca
-
Jeff Vander Stoep authored
am: 453f4a51 Change-Id: Iff9292a4a92fdd78eebdf2ec5fab8d571fc755f6
-
Jeff Vander Stoep authored
am: ca5bb337 Change-Id: I185d127216ee72821c64daf31601fdcbe1a9c069
-
Jeff Vander Stoep authored
am: 1eff6417 Change-Id: I095df5cbd680d495fac54186ab16e2287d454c3a
-
TreeHugger Robot authored
-
Android Build Merger (Role) authored
* changes: remove mke2fs rules from global file_contexts am: 0d32323c -s ours move e2fs tools from /sbin to /system/bin am: ae047956
-
Jeff Vander Stoep authored
Address "granted" audit messages for dumpstate use of df. avc: granted { getattr } for comm="df" path="/mnt" dev="tmpfs" scontext=u:r:dumpstate:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir avc: granted { search } for comm="df" name="/" dev="tmpfs" scontext=u:r:dumpstate:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir Bug: 28760354 Test: Build, check logs. Change-Id: I920948a5f0bce1b4bd2f15779730df8b3b1fea5a
-
- Jul 05, 2017
-
-
Jeff Vander Stoep authored
Change fb889f23 "Force expand all hal_* attributes" annotated all hal_* attributes to be expanded to their associated types. However some of these attributes are used in CTS for neverallow checking. Mark these attributes to be preserved. In addition, remove the hacky workaround introduced in oc-dev for b/62658302 where extraneous neverallow rules were introduced to prevent unused or negated attributes from being auto-expanded from policy. Bug: 62658302 Bug: 63135903 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest armeabi-v7a CtsSecurityHostTestCases completed in 4s. 501 passed, 0 failed, 0 not executed Merged-In: I989def70a16f66e7a18bef1191510793fbe9cb8c Change-Id: I989def70a16f66e7a18bef1191510793fbe9cb8c
-
Jin Qian authored
move them to device-specific files. Bug: 62908056 Change-Id: I299819785d5a64e6ecdde1cd7da472477fe1e295 Merged-In: If92352ea7a70780e9d81ab10963d63e16b793792
-
Jin Qian authored
Test: let fs_mgr format a damaged /data partition Bug: 35219933 Change-Id: I379567772c73e52f532a24acf640c21f2bab5c5b Merged-In: I379567772c73e52f532a24acf640c21f2bab5c5b
-
- Jul 03, 2017
-
-
Nick Kralevich authored
am: aa33afc9 Change-Id: I39b6028f7960b13af1fd83cbfa0f7fec4cac1bab
-
Nick Kralevich authored
am: b748e652 Change-Id: I4cd3587232e426b2684c77a7cb548b006f6f8647
-
Nick Kralevich authored
Test: Policy compiles. Change-Id: Iaa19c64f6b54423dbfa5ae16d288501ab0e64cbc
-
Treehugger Robot authored
-
Jeff Sharkey authored
am: 6433a09c Change-Id: I2efd5ff367424b86ea336ad0a4bb56eca368f4f2
-
Jeff Sharkey authored
am: b41291f5 Change-Id: I8e1151461bdd5a47cc81a9be744a8918bb61560a
-
Jeff Sharkey authored
am: a6f6295c Change-Id: I0c54b62288aa73842a9f0dc8fa0f9a5c8e64bc98
-
Treehugger Robot authored
-
Jeffrey Vander Stoep authored
am: 739f7598 Change-Id: I0e63a008436b860549cdc687276c33df475afa77
-
Jeff Vander Stoep authored
am: c8338f26 Change-Id: Id3db0306763ca605dcdf11409f3b591d6ceda312
-
Jeffrey Vander Stoep authored
am: f44267a5 Change-Id: Iea0f7ef8960d89d19451b7a47dc1852155dd3af9
-
Jeff Vander Stoep authored
am: 8745ac43 Change-Id: I6816eea55ad110d7aeea43ec3088452b38b7ccc7
-
Jeff Vander Stoep authored
avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: granted { getattr } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir Fixes: 62619253 Test: policy builds, no more "granted" messages in dmesg for recovery. Merged-In: I3f6d8ceee80307a01a8fd40cb4f8362a9825b1a3 Change-Id: I3f6d8ceee80307a01a8fd40cb4f8362a9825b1a3 (cherry picked from commit ea1d6e7d)
-
Jeffrey Vander Stoep authored
am: 6466092f Change-Id: I856e01d9d06978dfcaf13fff078430cefbc7a9eb
-
Jeff Vander Stoep authored
am: 88e4be54 Change-Id: I064f2becfde44f300ddf9d36802972b35c54e152
-
Jeffrey Vander Stoep authored
-
Jeff Sharkey authored
When installd clears cached files on external storage, the sdcardfs kernel filesystem needs to be kept in the loop to release any cached dentries that it's holding onto. (Otherwise the underlying disk space isn't actually released.) installd can already delete the underlying files directly (via the media_rw_data_file rules), so this technically isn't expanding its capabilities. avc: granted { search } for name="/" dev="tmpfs" ino=6897 scontext=u:r:installd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir avc: denied { open } for path="/mnt/runtime/default/emulated/0/Android/data" dev="sdcardfs" ino=589830 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=1 avc: denied { write } for name="com.google.android.inputmethod.japanese" dev="sdcardfs" ino=590040 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 avc: denied { remove_name } for name="cache_r.m" dev="sdcardfs" ino=589868 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 avc: denied { getattr } for path="/mnt/runtime/default/emulated/0/Android/data/.nomedia" dev="sdcardfs" ino=589831 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 Test: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.StorageHostTest Bug: 37486230 Change-Id: Icfd00a9ba379b1f50c48fe85849304cf9859bcb2 (cherry picked from commit 72f4c619)
-
Jeff Vander Stoep authored
Logs show that only dumpstate requires access. avc: granted { read open } for comm="screencap" path="/dev/ion" dev="tmpfs" ino=14324 scontext=u:r:dumpstate:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file avc: granted { ioctl } for comm="screencap" path="/dev/ion" dev="tmpfs" ino=14324 ioctlcmd=4906 scontext=u:r:dumpstate:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file Grant ion permission to dumpstate which uses it for screencap feature. Bug: 28760354 Test: build. Check logs. Change-Id: I6435b7dbf7656669dac5dcfb205cf0aeda93991b
-
- Jul 01, 2017
-
-
Jeff Vander Stoep authored
am: 685db0b2 Change-Id: I5c4ae29b9623ee04f0409c5f2e4da9fb325a430f
-
Jeff Vander Stoep authored
am: 9ce812fb Change-Id: Ie71e8eb97e3ace63a230fcd70b81961d1a8f4884
-
Jeff Vander Stoep authored
am: e39d5c87 Change-Id: Ibdb49f80b11fca40f5c4de7a92780be26b3280eb
-
Andres Oportus authored
am: 3ce2c6f8 Change-Id: Ic54d118a477d1827952e1c54216ff01838d985d7
-
Jeff Vander Stoep authored
am: 1a1cefcc Change-Id: I93ad1ad5f769f68c856e7a3cfcc0bcd8792633f2
-
Andres Oportus authored
am: e96aad09 Change-Id: I0742836c6b613afeab2dcf6d59c37dd9787dc91a
-
Jeff Vander Stoep authored
am: 2af7c84f Change-Id: Id52f1fd3e79a0a36df42abca24c93b28b277c570
-
Andres Oportus authored
am: 439364d2 Change-Id: I726672b2e3379e2e53d3c6b26482147f11d06d8e
-