Skip to content
Snippets Groups Projects
  1. Jan 15, 2016
  2. Jan 14, 2016
    • Jeffrey Vander Stoep's avatar
      5de7574a
    • Jeffrey Vander Stoep's avatar
      Revert "fc_sort: initial commit" · b1fb7e40
      Jeffrey Vander Stoep authored
      Breaks builds with no device specific policy.
      
      Bug: 26568553
      This reverts commit 29d14688.
      
      Change-Id: If9254d4ad3f104a96325beedebc05dd22664084a
      b1fb7e40
    • William Roberts's avatar
      fc_sort: add NOTICE file · c68a277f
      William Roberts authored
      
      Change-Id: I0e63f90cafc5b1ca9cc112e852e172046b16a17e
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      c68a277f
    • Jeffrey Vander Stoep's avatar
      Merge "fc_sort: initial commit" · 2dea4525
      Jeffrey Vander Stoep authored
      2dea4525
    • Nick Kralevich's avatar
      drop dhcp auditallow · c29b2fc4
      Nick Kralevich authored
      toolbox_exec is executed by dhcpcd-run-hooks.
      
      Addresses the following auditallow log spam:
      
        avc: granted { read open } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read } for comm="setprop" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute } for comm="dhcpcd-run-hook" name="toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { execute_no_trans } for comm="dhcpcd-run-hook" path="/system/bin/toybox" dev="dm-0" ino=650 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        avc: granted { read execute } for comm="setprop" path="/system/bin/toybox" dev="dm-0" ino=639 scontext=u:r:dhcp:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
      
      Change-Id: Ib83c291961a5573397830032a67a2f6861ae2e71
      c29b2fc4
  3. Jan 13, 2016
  4. Jan 11, 2016
    • Tom Cherry's avatar
      Remove special case handling of "ro." properties · f89847a9
      Tom Cherry authored
      Currently, properties that begin with "ro." are special cased to skip
      over the "ro." part of the prefix before matching with entries in
      property_contexts.  A change to init is removing this special case and
      therefore, the "ro." prefixes must be explicitly added to
      property_contexts.
      
      Bug 26425619
      
      Change-Id: I343f139a39abef99924e84e0d27699284f335d63
      f89847a9
  5. Jan 08, 2016
  6. Jan 07, 2016
    • Nick Kralevich's avatar
      su.te: drop domain_deprecated and app auditallow rules. · 0af2aa0b
      Nick Kralevich authored
      su is in permissive all the time. We don't want SELinux log
      spam from this domain.
      
      Addresses the following logspam:
      
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/graphics/fb0/vsync_event" dev="sysfs" ino=10815 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/thermal/thermal_zone2/temp" dev="sysfs" ino=15368 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
        avc: granted { read } for comm="sh" name="emmc_therm" dev="sysfs" ino=17583 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: I8e17d3814e41b497b25ce00cd72698f0d22b3ab0
      0af2aa0b
    • dcashman's avatar
      Allow domain to read symlinks in /sys. · cee72924
      dcashman authored
      Address the following denial:
      avc: denied { read } for name="battery" dev="sysfs" ino=17945 scontext=u:r:shell:s0 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
      
      Bug: 26219114
      Change-Id: I862b40a6514bffaa455dd7f06368acf9bcdc4782
      cee72924
    • Jeff Vander Stoep's avatar
      app: remove permission to execute gpu_device · 1911c27f
      Jeff Vander Stoep authored
      Not actually needed as demonstrated by the auditallow rule.
      
      Change-Id: Ia92c82ec237ab3490a1d51fa3371778e43e09504
      1911c27f
    • Bertrand SIMONNET's avatar
      Allows init to send signals. · 34e4da5f
      Bertrand SIMONNET authored
      This will allow init to terminate services cleanly (SIGTERM, wait,
      SIGKILL) when needed.
      
      Bug: 26216447
      Test: manual: init is able to send a SIGTERM signal without denials.
      
      Change-Id: Id2471ca08c0b011be64a36956628e965bc999bc6
      34e4da5f
    • Nick Kralevich's avatar
      Remove cache_recovery_file symlink read · dc37ea73
      Nick Kralevich authored
      auditallow shows no hits.
      
      Change-Id: I5ae33d34cd4bfa48f4384926fcafd84bec60e899
      dc37ea73
    • William Roberts's avatar
      fc_sort: initial commit · 29d14688
      William Roberts authored
      
      Ordering matters in fc files; the last match wins. In builds where
      many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
      increasingly important in order to maintain a cohesive built
      file_contexts.
      
      To correct this, we sort the device specific file_contexts entries
      with the upstream fc_sort tool.
      
      Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      29d14688
  7. Jan 06, 2016
  8. Jan 05, 2016
  9. Jan 04, 2016
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
    • dcashman's avatar
      Create sysfs_zram label. · 36f255ff
      dcashman authored
      Address following denials:
      avc: denied { getattr } for path="/sys/devices/virtual/block/zram0/disksize" dev="sysfs" ino=14958 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { search } for name="zram0" dev="sysfs" ino=14903 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { read } for name="mem_used_total" dev="sysfs" ino=14970 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { write } for name="uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { open } for path="/sys/devices/virtual/block/zram0/uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { read } for pid=348 comm="vold" name="zram0" dev="sysfs" ino=15223 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { search } for pid=3494 comm="ContactsProvide" name="zram0"dev="sysfs" ino=15223 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      
      Bug: 22032619
      Change-Id: I40cf918b7cafdba6cb3d42b04b1616a84e4ce158
      36f255ff
  10. Dec 29, 2015
  11. Dec 24, 2015
    • Daichi Hirono's avatar
      Add new rules for appfuse. · a20802dd
      Daichi Hirono authored
      The new rules are used to allow to mount FUSE file system for priv-app.
      
      Change-Id: I5ce2d261be501e2b3fef09b7666f1e5d1cddbe52
      a20802dd
  12. Dec 23, 2015
Loading