Skip to content
Snippets Groups Projects
  1. Dec 22, 2017
  2. Dec 20, 2017
    • Treehugger Robot's avatar
      d4bb9b73
    • Tri Vo's avatar
      Merge "init: tighten sysfs_type permissions" · 021344cc
      Tri Vo authored
      021344cc
    • Jeff Vander Stoep's avatar
      app: move appdomain to public policy · 77b290f3
      Jeff Vander Stoep authored
      Vendor-specific app domains depend on the rules in app.te so they
      must reside in public policy.
      
      Bug: 70517907
      Test: build
      Change-Id: If45557a5732a06f78c752779a8182e053beb25a2
      Merged-In: If45557a5732a06f78c752779a8182e053beb25a2
      (cherry picked from commit 1f4cab8b)
      77b290f3
    • Tony Mak's avatar
      Add selinux policy for CrossProfileAppsService · 215fb3ef
      Tony Mak authored
      CrossProfileAppsService allows apps to do limited cross profile
      operations, like checking the caller package is installed in
      the specified user. It is similar to LauncherAppsService in some sense.
      
      Merged-In: I26e383a57c32c4dc9b779752b20000b283a5bfdc
      Change-Id: I26e383a57c32c4dc9b779752b20000b283a5bfdc
      Fix: 67765768
      Test: Built with ag/3063260. Can boot and verified those APIs are working.
      (cherry picked from commit 6536c9e0)
      215fb3ef
    • Tri Vo's avatar
      init: tighten sysfs_type permissions · 55039509
      Tri Vo authored
      Removes open, read, setattr permissions to sysfs_type.
      Adds explicit permissions to:
      sysfs_dt_firmware_android
      sysfs_vibrator
      sysfs_wake_lock
      
      Bug: 65643247
      Test: walleye boots without denials to sysfs_type.
      Change-Id: I2e344831655c2c8e8e48b07ecce6a2704f2a206a
      55039509
  3. Dec 19, 2017
  4. Dec 18, 2017
    • xshu's avatar
      Wifi hal - Firmware dump permissions · 6ad3c891
      xshu authored
      we are aiming to improve logging performance by having wifi hal
      directly write to the flash.
      
      Wifi hal need to be able to create, write, and delete files in
      a directory. This will be restricted to userdebug and eng builds only.
      
      Bug: 70170285
      Test: compile, run on device
      Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
      6ad3c891
  5. Dec 16, 2017
  6. Dec 15, 2017
  7. Dec 14, 2017
    • Tri Vo's avatar
      perfprofd: allow traversing sysfs directories. · ae207915
      Tri Vo authored
      Bug: 70275668
      Test: walleye builds, boots.
      This change only expands the existing permissions, so shouldn't regress
      runtime behavior.
      Change-Id: I36e63f11d78998a88e3f8d1e6913e20762a359af
      ae207915
  8. Dec 13, 2017
  9. Dec 12, 2017
  10. Dec 11, 2017
    • Jeff Vander Stoep's avatar
      Restore recovery's ability to format cache and preserve logs · 87dd195b
      Jeff Vander Stoep authored
      Commit b8b4f5d6 'Clean up old file-based OTA SELinux rules' removed
      many permissions from recovery, a few of which are still required.
      Restore these.
      
      [ 2918.409108] type=1400 audit(2327427.540:159): avc:  denied
      { search } for  pid=339 comm="recovery" name="/" dev="mmcblk0p38"
      ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      [ 2586.563071] E:Failed to mount / create /cache/recovery: Permission
      denied
      [ 2586.780320] E:Can't open /cache/recovery/log: Permission denied
      [ 2586.850399] E:Can't open /cache/recovery/last_log: Permission
      denied
      [ 2586.918979] E:Can't open /cache/recovery/last_install: Permission
      denied
      
      [   54.035867] type=1400 audit(59206654.526:12): avc:  denied  { chown }
      for  pid=330 comm="recovery" capability=0  scontext=u:r:recovery:s0
      tcontext=u:r:recovery:s0 tclass=capability permissive=0a
      
      Bug: 70350029
      Test: xunchang to test
      Change-Id: I46ab049b8eb600b44c84a61777fade150cadd197
      87dd195b
    • Tri Vo's avatar
      Remove access to 'sysfs' files from healtd and charger. · d276b434
      Tri Vo authored
      We rely on vendors to label all dependencies of healthd/charger under
      /sys/class/power_supply with sysfs_batteryinfo type.
      
      Bug: 65643247
      Bug: 32659667
      Test: boots without denials from healthd, to sysfs_batteryinfo or to
      sysfs_msm_subsys.
      Test: charging with device turned off works without /sys denials.
      
      Change-Id: I893f309ecad8a0caf7d0b81f5f945725907255c2
      d276b434
  11. Dec 09, 2017
  12. Dec 08, 2017
  13. Dec 07, 2017
  14. Dec 06, 2017
Loading