Skip to content
Snippets Groups Projects
  1. Aug 01, 2017
  2. Jul 31, 2017
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · df964950
      Ruchi Kandoi authored
      type=1400 audit(1501520483.066:14): avc: denied { write } for pid=3330
      comm=4173796E635461736B202331 name="property_service" dev="tmpfs"
      ino=10749 scontext=u:r:nfc:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Test: No sepolicy denials
      Bug: 64010793
      Change-Id: I8d73e8e19cd4d0a8c61f1f184820c53e5cc2b6d6
      df964950
  3. Jul 29, 2017
  4. Jul 28, 2017
  5. Jul 27, 2017
  6. Jul 26, 2017
    • Jeff Vander Stoep's avatar
      Merge "cgroup: allow associate to tmpfs" am: 5a30eadc · 1c5ee00f
      Jeff Vander Stoep authored
      am: 1bc17b61
      
      Change-Id: I333680a1cd8f6233cd6c74ef19ec5835d56b47c5
      1c5ee00f
    • Jeff Vander Stoep's avatar
      Merge "cgroup: allow associate to tmpfs" · 1bc17b61
      Jeff Vander Stoep authored
      am: 5a30eadc
      
      Change-Id: I02b0984e1ecb119e2793d01a950e2e643d3ea5c8
      1bc17b61
    • Treehugger Robot's avatar
      5a30eadc
    • Jeff Vander Stoep's avatar
      Merge "system_server: read symlinks in /cache" am: 825173e3 · 4c41b73b
      Jeff Vander Stoep authored
      am: 3d765cfd
      
      Change-Id: Ie2790bb100048f2dbc2ae441c9f615c85e41704d
      4c41b73b
    • Jeff Vander Stoep's avatar
      Merge "system_server: read symlinks in /cache" · 3d765cfd
      Jeff Vander Stoep authored
      am: 825173e3
      
      Change-Id: Ic7acb327cf684e6b82b1d40b408c039e02c0a7fd
      3d765cfd
    • Treehugger Robot's avatar
      825173e3
    • Jeff Vander Stoep's avatar
      cgroup: allow associate to tmpfs · 5dcaa67b
      Jeff Vander Stoep authored
      Allows groups to be mounted at /dev/memcg
      
      Addresses:
      avc: denied { associate } for comm="init" name="memcg"
      scontext=u:object_r:cgroup:s0 tcontext=u:object_r:tmpfs:s0
      tclass=filesystem permissive=0
      
      Bug: 64067152
      Test: build
      Change-Id: Ic8f641e841fe09c8f7fd487ed67cf0ab4860a1cc
      5dcaa67b
    • Jeff Vander Stoep's avatar
      system_server: read symlinks in /cache · a4cada74
      Jeff Vander Stoep authored
      type=1400 audit(0.0:6): avc: denied { read } for comm="Thread-5"
      name="cache" dev="dm-0" ino=13 scontext=u:r:system_server:s0
      tcontext=u:object_r:cache_file:s0 tclass=lnk_file permissive=0
      
      Bug: 64067152
      Test: build
      Change-Id: Ie90c0343a834aa87b7ded41f503e05d9b63b3244
      a4cada74
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove proc access am: c15d54ef · c898e590
      Jeff Vander Stoep authored
      am: ad95219c
      
      Change-Id: I1c56aed1846de0742fa264c82111631b8336ce9b
      c898e590
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove proc access · ad95219c
      Jeff Vander Stoep authored
      am: c15d54ef
      
      Change-Id: I5b47e2ced9dd5aa92727076e4cef0cc4ebaeaf7c
      ad95219c
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove proc access · c15d54ef
      Jeff Vander Stoep authored
      Remove "granted" logspam. Grante the observed permissions to the
      individual processes that need them and remove the permission from
      domain_deprecated.
      
      avc: granted { read open } for comm="ndroid.settings"
      path="/proc/version" dev="proc" ino=4026532081
      scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { getattr } for comm=4173796E635461736B202332
      path="/proc/pagetypeinfo" dev="proc" ino=4026532129
      scontext=u:r:system_app:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="uncrypt" path="/proc/cmdline"
      dev="proc" ino=4026532072 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="update_engine"
      path="/proc/sys/kernel/random/boot_id" dev="proc" ino=15852829
      scontext=u:r:update_engine:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      avc: granted { read open } for comm="tiveportallogin"
      path="/proc/vmstat" dev="proc" ino=4026532130
      scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:proc:s0
      tclass=file
      
      This change is specifically not granting the following since it
      should not be allowed:
      avc: granted { read open } for comm="crash_dump64"
      path="/proc/filesystems" dev="proc" ino=4026532416
      scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { read } for comm="crash_dump64" name="filesystems"
      dev="proc" ino=4026532416 scontext=u:r:dex2oat:s0
      tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { getattr } for comm="crash_dump64"
      path="/proc/filesystems" dev="proc" ino=4026532416
      scontext=u:r:dex2oat:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 64032843
      Bug: 28760354
      Test: build
      Change-Id: Ib309e97b6229bdf013468dca34f606c0e8da96d0
      c15d54ef
Loading