Skip to content
Snippets Groups Projects
  1. Nov 15, 2017
  2. Nov 14, 2017
    • Jeff Vander Stoep's avatar
      Add tracking bugs to crash_dump denials · 41401f47
      Jeff Vander Stoep authored
      avc: denied { search } for name="com.sf.activity" dev="sda35"
      ino=1444147 scontext=u:r:crash_dump:s0:c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir
      avc: denied { search } for comm="crash_dump64"
      name="com.android.bluetooth" dev="sda13" ino=1442292
      scontext=u:r:crash_dump:s0 tcontext=u:object_r:bluetooth_data_file:s0
      tclass=dir
      avc: denied { search } for comm="crash_dump64" name="overlay" dev="dm-1"
      ino=938 scontext=u:r:crash_dump:s0
      tcontext=u:object_r:vendor_overlay_file:s0 tclass=dir permissive=0
      
      Bug: 68705274
      Bug: 68319037
      Test: build
      Change-Id: I44075ac6bf6447d863373c97ba10eadf59d2d22f
      41401f47
    • Tianjie Xu's avatar
      Do not audit the fsetid capability for update engine · 29fc85ee
      Tianjie Xu authored
      There's a selinux denial for update_engine after go/aog/530462; the
      denial is likely due to the setgid bit of the
      update_engine_log_data_file.
      Message:
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:4): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      11-11 02:07:54.843   870   870 I auditd  : type=1400 audit(0.0:5): avc:
      denied { fsetid } for comm="update_engine" capability=4
      scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0
      tclass=capability permissive=0
      
      Bug: 69197466
      Test: denial message gone on sailfish.
      Change-Id: I0fdc285e4a4faa8dc37b4907484b3c79d4cc49cf
      29fc85ee
    • Xin Li's avatar
      Merge commit 'd9664064' into HEAD · c667a0ed
      Xin Li authored
      Change-Id: Icec8dfff5cff17cf1b557882db62b148a7218b98
      c667a0ed
    • Chad Brubaker's avatar
      Merge "Allow Instant/V2 apps to load code from /data/data" · ba87a9aa
      Chad Brubaker authored
      am: 7c662776
      
      Change-Id: I20f956cd6cfbd198dc8e72fb7d3bfeadeb2f09d5
      ba87a9aa
    • Treehugger Robot's avatar
  3. Nov 13, 2017
  4. Nov 10, 2017
  5. Nov 09, 2017
    • Tri Vo's avatar
      Merge changes from topic "cki_proc_init" · cec8b2cd
      Tri Vo authored
      am: aa93dad6
      
      Change-Id: I341b2a69e99c01242cbed24adfc5f51dd7ef78b5
      cec8b2cd
    • Chenbo Feng's avatar
      sepolicy: allow netd to write to qtaguid file · 185941aa
      Chenbo Feng authored
      Since all qtaguid related userspace implementation are moved into netd
      and will use netd to choose which module to run at run time. Netd module
      should be the only process can directly read/write to the ctrl file of
      qtaguid located at /proc/net/xt_qtaguid/ctrl. This sepolicy change grant
      netd the privilege to access qtaguid proc files. It also grant netd the
      permission to control trigger to turn on and off qtaguid module by write
      parameters to files under sys_fs. The file and directory related is
      properly labled.
      
      Bug: 68774956
      Bug: 30950746
      Test: qtaguid function still working after the native function is
      redirected.
      
      Change-Id: Ia6db6f16ecbf8c58f631c79c9b4893ecf2cc607b
      185941aa
    • Hakan Kvist's avatar
      Allow update_engine to access /data/misc/update_engine_log · 6fe014f8
      Hakan Kvist authored
      Add label update_engine_log_data_file for log files created by
      update engine in directory /data/misc/update_engine_log.
      
      Bug: 65568605
      Test: manual
      Change-Id: I379db82a0ea540e41cb3b8e03f93d9ce64fac7c9
      6fe014f8
    • Tri Vo's avatar
      Merge changes from topic "cki_proc_init" · aa93dad6
      Tri Vo authored
      * changes:
        init: label /proc dependencies and remove access to proc
        init: refactor access to proc_* labels.
      aa93dad6
    • Jeff Vander Stoep's avatar
      Suppress mediaprover access to certain cache dirs · c009efae
      Jeff Vander Stoep authored
      am: 182dbeb6
      
      Change-Id: I451582dd6b1a0f6b565132b87b37fbdacc7ea32a
      c009efae
    • Jeff Vander Stoep's avatar
      Suppress mediaprover access to certain cache dirs · 182dbeb6
      Jeff Vander Stoep authored
      avc: denied { getattr } for comm="sAsyncHandlerTh"
      path="/data/cache/recovery" dev="sda13" ino=7086082
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
      avc: denied { getattr } for path="/data/cache/backup"
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir
      
      Bug: 63038506
      Bug: 35197529
      Test: build police
      Change-Id: I51624c255e622bf712d41ca1bbf190ec3e4fefae
      (cherry picked from commit fcf1b2083935bd298a2ece8d6d0c18712865a04b)
      182dbeb6
    • Jeff Vander Stoep's avatar
      Allow vendor apps to use surfaceflinger_service · 2e369131
      Jeff Vander Stoep authored
      am: 63f46773
      
      Change-Id: I3ff43e1f579654b41ad7132efda8f486e1091f5c
      2e369131
    • Jeff Vander Stoep's avatar
      Allow vendor apps to use surfaceflinger_service · 63f46773
      Jeff Vander Stoep authored
      Vendor apps may only use servicemanager provided services
      marked as app_api_service. surfaceflinger_service should be
      available to vendor apps, so add this attribute and clean up
      duplicate grants.
      
      Addresses:
      avc:  denied  { find } scontext=u:r:qtelephony:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      avc:  denied  { find } scontext=u:r:ssr_detector:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      avc:  denied  { find } scontext=u:r:qcneservice:s0
      tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager
      
      Bug: 69064190
      Test: build
      Change-Id: I00fcf43b0a8bde232709aac1040a5d7f4792fa0f
      63f46773
    • Jeff Vander Stoep's avatar
      Merge "wifi_supplicant: refactor permissions" · 94965d59
      Jeff Vander Stoep authored
      am: b43a1c84
      
      Change-Id: I693dbe61b33633a31fda4e75b3abba69820ac2d4
      94965d59
    • Treehugger Robot's avatar
      b43a1c84
Loading