- Jan 27, 2016
-
-
Jeffrey Vander Stoep authored
am: 1cf93217 * commit '1cf93217': vold: grant perms from domain_deprecated
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
am: f33507df * commit 'f33507df': healthd: grant perms from domain_deprecated
-
Daniel Cashman authored
am: fea9ad7c * commit 'fea9ad7c': remove access_kmsg macro, because it to be more explicit.
-
Jeffrey Vander Stoep authored
-
Daniel Cashman authored
-
Jeffrey Vander Stoep authored
am: eecaa0b5 * commit 'eecaa0b5': zygote: grant perms from domain_deprecated
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
In preparation of removing permissions from domain_deprecated. Addresses: avc: denied { read } for name="fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: denied { open } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: denied { getattr } for path="/fstab.flounder" dev="rootfs" ino=4729 scontext=u:r:vold:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: denied { read } for name="/" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: denied { open } for path="/cache" dev="mmcblk0p30" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: denied { ioctl } for path="/cache" dev="mmcblk0p30" ino=2 ioctlcmd=5879 scontext=u:r:vold:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir avc: denied { open } for path="/proc" dev="proc" ino=1 scontext=u:r:vold:s0 tcontext=u:object_r:proc:s0 tclass=dir avc: denied { read } for name="psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { open } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { getattr } for path="/proc/157/net/psched" dev="proc" ino=4026536519 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file Change-Id: I8af7edc5b06675a9a2d62bf86e1c22dbb5d74370 avc: denied { read } for name="block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir avc: denied { open } for path="/sys/block" dev="sysfs" ino=2582 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
-
Jeff Vander Stoep authored
In preparation of removing permissions from domain_deprecated. Addresses: avc: denied { read } for name="present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: denied { open } for path="/sys/devices/platform/htc_battery_max17050.8/power_supply/flounder-battery/present" dev="sysfs" ino=5003 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0 tclass=file Change-Id: Iaee5b79a45aedad98e08c670addbf444c984165e
-
Jeff Vander Stoep authored
In preparation of removing permissions from domain_deprecated. Addresses: avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file Change-Id: Ie94d3db3c5dccb8077ef5da26221a6413f5d19c2
-
Jeffrey Vander Stoep authored
am: 98f60e5c * commit '98f60e5c': Revert "zygote: grant perms from domain_deprecated"
-
dcashman authored
Address the following denial: type=1400 audit(1453854842.899:7): avc: denied { search } for pid=1512 comm="sdcard" name="/" dev="tmpfs" ino=7547 scontext=u:r:sdcardd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0 vold: EmulatedVolume calls sdcard to mount on /storage/emulated. Bug: 26807309 Change-Id: Ifdd7c356589f95165bba489dd06282a4087e9aee
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
This reverts commit e52fff83. Change-Id: Ieafb5214940585d63ff6f0b4802d8c7d1c126174
-
Jeffrey Vander Stoep authored
am: 4115beae * commit '4115beae': zygote: grant perms from domain_deprecated
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
In preparation of removing permissions from domain_deprecated. Addresses: avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file Change-Id: I5b505ad386a445113bc0a1bb35d4f88f7761c048
-
Narayan Kamath authored
am: c4121add * commit 'c4121add': Revert "Remove domain_deprecated from sdcard domains"
-
Narayan Kamath authored
-
Narayan Kamath authored
This reverts commit 0c7bc58e. bug: 26807309 Change-Id: I8a7b0e56a0d6f723508d0fddceffdff76eb0459a
-
Jeff Vander Stoep authored
am: be0616ba * commit 'be0616ba': domain: grant write perms to cgroups
-
Jeff Vander Stoep authored
Was moved to domain_deprecated. Move back to domain. Files in /acct/uid/*/tasks are well protected by unix permissions. No information is leaked with write perms. Change-Id: I8017e906950cba41ce350bc0892a36269ade8d53
-
dcashman authored
Address the following denial: type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0 Bug: 26806629 Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
-
- Jan 26, 2016
-
-
SimHyunYong authored
This macro does not give us anything to it. Change-Id: Ie0b56716cc0144f0a59849647cad31e06a25acf1
-
SimHyunYong authored
am: 093ea6fb * commit '093ea6fb': Using r_dir_file macro in domain.te
-
Jeffrey Vander Stoep authored
am: cdae042a * commit 'cdae042a': Remove domain_deprecated from sdcard domains
-
SimHyunYong authored
r_dir_file(domain, self) allow domain self:dir r_dir_perms; allow domain self:lnk_file r_file_perms; allow domain self:file r_file_perms; te_macros define(`r_dir_file', ` allow $1 $2:dir r_dir_perms; allow $1 $2:{ file lnk_file } r_file_perms; ') Change-Id: I7338f63a1eaa8ca52cd31b51ce841e3dbe46ad4f
-
Jeffrey Vander Stoep authored
-
James Hawkins authored
am: ae29dea8 * commit 'ae29dea8': bootstat: Fix the SELinux policy after removing domain_deprecated.
-
James Hawkins authored
-
SimHyunYong authored
am: 7171232c * commit '7171232c': Delete policy it is alread included in binder_call macros.
-
James Hawkins authored
* Allow reading /proc. type=1400 audit(1453834004.239:7): avc: denied { read } for pid=1305 comm="bootstat" name="uptime" dev="proc" ino=4026536600 scontext=u:r:bootstat:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 * Define domain for the /system/bin/bootstat file. init: Service exec 4 (/system/bin/bootstat) does not have a SELinux domain defined. Bug: 21724738 Change-Id: I4baa2fa7466ac35a1ced79776943c07635ec9804
-
SimHyunYong authored
define(`binder_call', ` allow $1 $2:binder { call transfer }; allow $2 $1:binder transfer; allow $1 $2:fd use; ') binder_call(surfaceflinger, appdomain) binder_call(surfaceflinger, bootanim) it is alread include these policy.. so I can delete these policy! allow surfaceflinger appdomain:fd use; allow surfaceflinger bootanim:fd use;
-
Jeffrey Vander Stoep authored
am: 0220b345 * commit '0220b345': Delete duplicated policy, it is already include in app.te.
-
Jeffrey Vander Stoep authored
-
Tao Bao authored
-