- Mar 08, 2018
-
-
Joel Galenson authored
This commit adds new SELinux permissions and neverallow rules so that taking a bugreport does not produce any denials. Bug: 73256908 Test: Captured bugreports on Sailfish and Walleye and verified that there were no denials. Merged-In: If3f2093a2b51934938e3d7e5c42036b2e2bf6de9 Change-Id: If3f2093a2b51934938e3d7e5c42036b2e2bf6de9 (cherry picked from commit daf1cdfa5ac7eca95f3b21034174a495a6760e47)
-
- Mar 02, 2018
-
-
Jerry Zhang authored
am: 66adf0cd Change-Id: I88a90ad2fc9243724e4ddb6f9da469857ffd115b
-
Jerry Zhang authored
am: caf0139b Change-Id: I874a41e0072352f5b8a0fc2b0080913c206520e1
-
Jerry Zhang authored
am: 1d401545 Change-Id: I7502e6ff1e45c12340b9f830bcc245fd2c80996e
-
- Mar 01, 2018
-
-
Ryan Longair authored
am: 1ee556ed -s ours Change-Id: I3cc14d0b4d61136651c89671d2b134a86fc9450f
-
Ryan Longair authored
am: b7602d76 Change-Id: Ic731e6165c89f205bce4c96fbf760454550acd81
-
Jerry Zhang authored
UsbDeviceManager in system_server now helps set up the endpoint files. Bug: 72877174 Test: No selinux denials Change-Id: I96b11ee68799ac29b756d2034e7f5e4660dbed98
-
Ryan Longair authored
Bug:74022614 Test: `sts-tradefed run sts -m CtsSecurityHostTestCases -t android.cts.security.SELinuxNeverallowRulesTest` Merged-In: I53f7bef927bcefdbe0edd0b919f11bdaa134a48b Change-Id: I53f7bef927bcefdbe0edd0b919f11bdaa134a48b
-
Ryan Longair authored
Bug:74022614 Test: `sts-tradefed run sts -m CtsSecurityHostTestCases -t android.cts.security.SELinuxNeverallowRulesTest` Change-Id: I53f7bef927bcefdbe0edd0b919f11bdaa134a48b
-
Android Build Merger (Role) authored
[automerger] Fix sepolicy-analyze makefile so it is included in STS builds am: 7dab0f94 am: fa412d2d am: e9a260bb am: 89455f2e Change-Id: Ic7c0f37773c22bd11e9b48e07bc46766d053da58
-
Android Build Merger (Role) authored
[automerger] Fix sepolicy-analyze makefile so it is included in STS builds am: 7dab0f94 am: fa412d2d am: e9a260bb Change-Id: Id65e91d0c3bdced074a6aa99902fcdfc0d97628c
-
Android Build Merger (Role) authored
[automerger] Fix sepolicy-analyze makefile so it is included in STS builds am: 7dab0f94 am: fa412d2d Change-Id: I5ae440fe30e214250bf66ea023104ab383700a54
-
Android Build Merger (Role) authored
Change-Id: I9a4944f131547c11329167bc327c0de2c08e1f20
-
Ryan Longair authored
Bug:74022614 Test: `sts-tradefed run sts -m CtsSecurityHostTestCases -t android.cts.security.SELinuxNeverallowRulesTest` Merged-In: I53f7bef927bcefdbe0edd0b919f11bdaa134a48b Change-Id: I53f7bef927bcefdbe0edd0b919f11bdaa134a48b
-
Alan Stokes authored
am: 0d12c356 Change-Id: I245c2914f51f317758148123dc1368c326f562f1
-
Alan Stokes authored
am: 324e6ef5 Change-Id: I6ed15ce344d61eab4d81928b09020d7fb0fb757a
-
Alan Stokes authored
am: 17d008ae Change-Id: Ib6305067a4f3bf30df918c63a049b7d689f9c255
-
Alan Stokes authored
We already grant rw file access, but without dir search it's not much use. denied { search } for name="vibrator" dev="sysfs" ino=49606 scontext=u:r:hal_vibrator_default:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=dir permissive=0 Bug: 72643420 Test: Builds, denial gone Change-Id: I3513c0a14f0ac1e60517009046e2654f1fc45c66
-
huans authored
Bug: 73952536 Test: run cts -m CtsCameraTestCases -t android.hardware.camera2.cts.IdleUidTest#testCameraAccessBecomingInactiveUid Change-Id: I508352671367dfa106e80108c3a5c0255b5273b2
- Feb 28, 2018
-
-
Jeff Vander Stoep authored
am: 426f78ca Change-Id: I4f1983feed32c668d723932c61a6f51692c61f53
-
Jeff Vander Stoep authored
am: 7a22490c Change-Id: I3e6731b04314f9c54c016c1c7584242cdd12e75f
-
Jeff Vander Stoep authored
am: 609aa6b8 Change-Id: I261753961c59527061254f0b1c7adca50a7c2bce
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: e39ba338 Change-Id: I56e9182157c8de6c3135ae8a33962bca46c405dd
-
Jeff Vander Stoep authored
am: d69acbbf Change-Id: Id2e01070d5669362b78f4adc865c4ff358711e60
-
Haynes Mathew George authored
am: 142bb78c Change-Id: I1e721f2bfb59d2510769b7ddae9c22d5c8ae7dba
-
Jeff Vander Stoep authored
am: 5b1c3b69 Change-Id: I8808fd94c8130a551803b2ed184c325d3dad86cb
-
Haynes Mathew George authored
am: 5d3e4f0c Change-Id: I56412b40f7f306ac32b588aba8de9a48a4f16c00
-
Haynes Mathew George authored
am: ebc7b434 Change-Id: If7f94440e35ad5a009ac6fa9d1cda3cb4fc17825
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
The kernel is unusual in that it's both a core process, but vendor provided. Exempt it from the restriction against accessing files from on /vendor. Also, rework the neverallow rule so that it disallows opening/modifying files, but allows reading files passed over IPC. Bug: 68213100 Test: build (this is a build-time test) Change-Id: I2f6b2698ec45d2e8480dc1de47bf12b9b53c4446
-
Jeff Vander Stoep authored
avc: denied { getattr } for path="/vendor/framework" scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_framework_file:s0 tclass=dir Bug: 68826235 Test: boot Taimen, verify denials no longer occur. Change-Id: Id4b311fd423342c8d6399c3b724417aff9d1cd88
-