- Sep 05, 2017
-
-
Steven Moreland authored
am: 59f23650 -s ours Change-Id: I8563d9e3347f7c62d9fcd5b2c26c160a957be0b5
-
Steven Moreland authored
am: 8b6ceed0 Change-Id: I39a8c2a75f646f3943d925adc4444777a90b9076
-
Steven Moreland authored
am: 5b2ebd3b Change-Id: I74209b877fdacaa485798b393678989029835924
-
Steven Moreland authored
This reverts commit 9216a6ad. Bug: 65206688 Merged-In: I8e61b77a1abe9543e4fba77defb8062407676fcf Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
-
- Sep 01, 2017
-
-
Dan Willemsen authored
am: a30b6a5c Change-Id: I3f7ace8c849689d66558c38c149453564920d013
-
Dan Willemsen authored
am: 4deeab5c Change-Id: I74319e51a152ba35fdf076a4dffdeeb0dc69763b
-
Dan Willemsen authored
am: cdaf97bf Change-Id: Ibcb3d728c233530f7354b409bf3849a021532b5d
-
Treehugger Robot authored
-
Ray Essick authored
am: 123cf237 Change-Id: I77c8793363ad2e3736ca587070b1cbd119168f53
-
Ray Essick authored
-
Dan Willemsen authored
Test: SANITIZE_HOST=true m treble_sepolicy_tests Change-Id: I9190dc06715bbbac8a267a143801f99f911decf3
-
Robert Benea authored
am: fa85fac7 Change-Id: I43092ff1907c28239565b813c84be43cdc8aae5e
-
Robert Benea authored
am: adf68570 Change-Id: Ida2b4c0d8f400c753566861bd48bcf5459fc40b7
-
Robert Benea authored
am: b22278e4 Change-Id: Id1c46283531412a75ffe46f1beb26d5cdc732b8f
-
Robert Benea authored
-
Jeff Vander Stoep authored
am: 15f9d052 Change-Id: I63deaebd7e90dafb1c6afa00b9b9474344a4cc6e
-
Robert Benea authored
am: ba4d04e0 Change-Id: Iea1a6d7fc4220566b912d19122b820d918b333d8
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Steven Moreland authored
am: 60e53837 Change-Id: Ic262062da2065dddbabaff26f38d779f4e63b95d
-
Steven Moreland authored
am: f606a51e Change-Id: If76f2528ca0edb4f0ad37a85fdc85356ab1e14ae
-
Steven Moreland authored
am: 9c571765 Change-Id: I5834ea1a451989905c893194857fc77f3bad529e
-
Jeff Vander Stoep authored
Allows groups to be mounted at /dev/memcg Addresses: avc: denied { associate } for comm="init" name="memcg" scontext=u:object_r:cgroup:s0 tcontext=u:object_r:tmpfs:s0 tclass=filesystem permissive=0 Bug: 64067152 Test: build Change-Id: Ic8f641e841fe09c8f7fd487ed67cf0ab4860a1cc
-
Robert Benea authored
Currently lmkd is not able to read memcg info. The mem/swap usage info are used by lmkd to ugrade medium pressure events to critical level. Test: tested on gobo Bug: 65180281 Change-Id: I19d0eb53d5e754c176ffeda1b5d07049e6af8570
-
Steven Moreland authored
This reverts commit f27bba93. Bug: 65206688 Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
-
Steven Moreland authored
This reverts commit c12c7349. Bug: 65206688 Change-Id: Ia2a04906f8585bf295b8c75e0b3d09490afb5d24
-
Steven Moreland authored
This reverts commit b5dd44b1. Bug: 65206688 Change-Id: I00431ae7834a562e34e8959446d84a0077834091
-
Steven Moreland authored
am: b5dd44b1 Change-Id: Ic8abc28d08483866112dd8075340fe71e82ae653
-
- Aug 31, 2017
-
-
Steven Moreland authored
screencap domain needs additional permissions for dumpstate to dump screenshots. Test: adb shell cmd activity bug-report Bug: 65206688 Change-Id: I824f345fd90d286454d570576c5888d7719c4c5c
-
Steven Moreland authored
am: c12c7349 Change-Id: I419f605b03d497d3babd09651b977bc065677c71
-
Lazar Trsic authored
am: 9a5d0035 Change-Id: I19ea55e0064eb3cfd5e0f0de1e5076a0ac0b2f40
-
Lazar Trsic authored
am: 1019861b Change-Id: Id63c00a6cef89bd745947d9611d08b522426d8d1
-
Lazar Trsic authored
am: f58f1499 Change-Id: Id2eecfe21cfffec6ef95a194f0119d19ef43573e
-
Ray Essick authored
relax the sepolicy for media.metrics to allow access to package manager for uid->packagename mapping functionality. Bug: 65027506 Test: read output of 'dumpsys media.metrics' Change-Id: I0d25af16c06dc65154cfda854e28ab70ada097c4
-
Lazar Trsic authored
Change-Id: I721a48a441c4a416c1119b17086462f7cb8e5097
-
Bowgo Tsai authored
am: 811eed78 -s ours Change-Id: Idf2d73e9d8426e35cc13f3566c5cf283ccf060a3
-
Bowgo Tsai authored
am: 03015901 Change-Id: I9d37f7b1b15b32e2f9b69bbddd30276611019924
-
Bowgo Tsai authored
am: 851d5b64 Change-Id: Idc8aef8e3d250b7b7f40d0a51a528988f629298c
-
Treehugger Robot authored
-
Steven Moreland authored
Before screencap was in its own domain, it was able to do this by using all of shell's permissions. The following denials are caused (along with times from running the below test command) when screencap is invoked to write a file onto the sdcard: 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:23): avc: denied { read } for name="primary" dev="tmpfs" ino=19547 scontext=u:r:screencap:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:24): avc: denied { search } for name="/" dev="tmpfs" ino=19529 scontext=u:r:screencap:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:25): avc: denied { search } for name="user" dev="tmpfs" ino=19535 scontext=u:r:screencap:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:26): avc: denied { read } for name="primary" dev="tmpfs" ino=31198 scontext=u:r:screencap:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=lnk_file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:27): avc: denied { search } for name="/" dev="sdcardfs" ino=1310722 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:28): avc: denied { write } for name="image.png" dev="sdcardfs" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:29): avc: denied { open } for path="/storage/emulated/0/image.png" dev="sdcardfs" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:30): avc: denied { write open } for path="/data/media/0/image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:31): avc: denied { execute } for name="sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:32): avc: denied { read open } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:33): avc: denied { execute_no_trans } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I sh : type=1400 audit(0.0:34): avc: denied { getattr } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.586 4990 4990 I sh : type=1400 audit(0.0:35): avc: denied { ioctl } for path="socket:[57515]" dev="sockfs" ino=57515 ioctlcmd=5401 scontext=u:r:screencap:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=1 08-30 21:03:32.586 4990 4990 I sh : type=1400 audit(0.0:36): avc: denied { getattr } for path="socket:[57515]" dev="sockfs" ino=57515 scontext=u:r:screencap:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=1 08-30 21:03:32.589 4991 4991 I sh : type=1400 audit(0.0:37): avc: denied { execute_no_trans } for path="/system/bin/am" dev="dm-0" ino=1178 scontext=u:r:screencap:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:38): avc: denied { call } for scontext=u:r:screencap:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:39): avc: denied { use } for path="/dev/null" dev="tmpfs" ino=19514 scontext=u:r:system_server:s0 tcontext=u:r:screencap:s0 tclass=fd permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:40): avc: denied { transfer } for scontext=u:r:screencap:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 08-30 21:03:32.741 575 575 E SELinux : avc: denied { find } for service=activity pid=4992 uid=2000 scontext=u:r:screencap:s0 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1 08-30 21:03:32.749 837 837 I Binder:837_9: type=1400 audit(0.0:41): avc: denied { call } for scontext=u:r:system_server:s0 tcontext=u:r:screencap:s0 tclass=binder permissive=1 If /data/media/ is deleted, the following denials also occur: 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:43): avc: denied { search } for name="0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:44): avc: denied { read open } for path="/data/media/0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:48): avc: denied { write } for name="0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:49): avc: denied { add_name } for name="image.png" scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:50): avc: denied { create } for name="image.png" scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:51): avc: denied { setattr } for name="image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:53): avc: denied { write open } for path="/data/media/0/image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 01:04:29.741 6625 6625 W screencap: type=1400 audit(0.0:23): avc: denied { write } for name="0" dev="sdcardfs" ino=655364 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 Test: adb shell screencap -p /sdcard/phone.png Bug: 65206688 Change-Id: I808429b25fa3118fef7931050ab757c9bcd61881
-