Skip to content
Snippets Groups Projects
  1. Jul 10, 2017
    • TreeHugger Robot's avatar
      Merge "Update 26.0 prebuilts." · e3aab4c8
      TreeHugger Robot authored
      e3aab4c8
    • TreeHugger Robot's avatar
      eea658fd
    • Dan Cashman's avatar
      Split mediaprovider from priv_app. · 5637587d
      Dan Cashman authored
      This CL was accidentally reverted a second time by commit:
      cb5129f9.  Submit it for the third,
      and final, time.
      
      Bug: 62102757
      Test: Builds and boots.
      5637587d
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove access to /proc/meminfo · d017316f
      Jeff Vander Stoep authored
      Logs indicate that all processes that require access already have it.
      
      Bug: 28760354
      Test: build
      Change-Id: I3dfa16bf4fba7f653c5f8525e8c565e9e24334a8
      (cherry picked from commit 3e5bb807)
      d017316f
    • Jeff Vander Stoep's avatar
      dumpstate: remove domain_deprecated attribute am: 90ae4f6b am: 77285737 am: d5d98a4d · 278146f2
      Jeff Vander Stoep authored
      am: fcfeb3e0
      
      Change-Id: Ib50c35e368764f7acb87e23c1a0091ad7eeb1fd4
      278146f2
    • Jeff Vander Stoep's avatar
      Remove dumpstate selinux spam from logs am: f4ce8f6c am: 4e6f67fb am: 55efefc3 · 9473980a
      Jeff Vander Stoep authored
      am: e0e2b35b
      
      Change-Id: I607a7bddad8d3d02b9df3d5a4fb826a716a1a967
      9473980a
    • Jeff Vander Stoep's avatar
      dumpstate: remove domain_deprecated attribute am: 90ae4f6b am: 77285737 · fcfeb3e0
      Jeff Vander Stoep authored
      am: d5d98a4d
      
      Change-Id: I1dbcbcbb940fdcf94e2634f43d933c91bb13ce41
      fcfeb3e0
    • Jeff Vander Stoep's avatar
      Remove dumpstate selinux spam from logs am: f4ce8f6c am: 4e6f67fb · e0e2b35b
      Jeff Vander Stoep authored
      am: 55efefc3
      
      Change-Id: Ib67a9685e41019a290c903dc5b733d405ddddf61
      e0e2b35b
    • Jeff Vander Stoep's avatar
      dumpstate: remove domain_deprecated attribute am: 90ae4f6b · d5d98a4d
      Jeff Vander Stoep authored
      am: 77285737
      
      Change-Id: I19c2b7107293fbe903cd6601f36b85aa3d099f80
      d5d98a4d
    • Jeff Vander Stoep's avatar
      Remove dumpstate selinux spam from logs am: f4ce8f6c · 55efefc3
      Jeff Vander Stoep authored
      am: 4e6f67fb
      
      Change-Id: Ia3fe7f33ca0dc2f18040d3128ce84f0878fc8d63
      55efefc3
    • Jeff Vander Stoep's avatar
      dumpstate: remove domain_deprecated attribute · 77285737
      Jeff Vander Stoep authored
      am: 90ae4f6b
      
      Change-Id: Ia793ed369cc05c123fb013fd10e8b19f006d92ff
      77285737
    • Jeff Vander Stoep's avatar
      Remove dumpstate selinux spam from logs · 4e6f67fb
      Jeff Vander Stoep authored
      am: f4ce8f6c
      
      Change-Id: Ie0bc01a5b8acc6b79a3a31d5807f46f1e1df8c6c
      4e6f67fb
    • Jeff Vander Stoep's avatar
      dumpstate: remove domain_deprecated attribute · 90ae4f6b
      Jeff Vander Stoep authored
      Clean up "granted" logspam. Grant the observered audited permissions
      including:
      
      tcontext=cache_file
      avc: granted { getattr } for comm="df" path="/cache" dev="mmcblk0p9"
      ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
      tclass=dir
      avc: granted { search } for comm="Binder:8559_2" name="cache"
      dev="sda13" ino=1654785 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:cache_file:s0 tclass=dir
      avc: granted { read } for comm="Binder:8559_2" name="cache" dev="dm-0"
      ino=23 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
      tclass=lnk_file
      
      tcontext=proc
      avc: granted { getattr } for comm="Binder:14529_2"
      path="/proc/sys/fs/pipe-max-size" dev="proc" ino=247742
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
      tclass=file
      avc: granted { read } for comm="Binder:22671_2" name="cmdline"
      dev="proc" ino=4026532100 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { read open } for comm="dumpstate"
      path="/proc/sys/fs/pipe-max-size" dev="proc" ino=105621
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
      tclass=file
      
      tcontext=sysfs
      avc: granted { read open } for comm="Binder:14459_2"
      path="/sys/devices/virtual/block/md0/stat" dev="sysfs" ino=51101
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      avc: granted { read open } for comm="Binder:21377_2"
      path="/sys/devices/soc/1da4000.ufshc/host0/target0:0:0/0:0:0:1/block/sdb/sdb1"
      dev="sysfs" ino=40888 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:sysfs:s0 tclass=dir
      avc: granted { getattr } for comm="dumpstate" dev="sysfs" ino=40456
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      tcontext=proc_meminfo
      avc: granted { read } for comm="top" name="meminfo" dev="proc"
      ino=4026532106 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:proc_meminfo:s0 tclass=file
      avc: granted { read open } for comm="top" path="/proc/meminfo"
      dev="proc" ino=4026532106 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:proc_meminfo:s0 tclass=file
      
      tcontext=rootfs
      avc: granted { getattr } for comm="df" path="/" dev="dm-0" ino=2
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0 tclass=dir
      avc: granted { getattr } for comm="ip" path="/vendor" dev="rootfs"
      ino=99 scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0
      tclass=lnk_file
      
      tcontext=selinuxfs
      avc: granted { getattr } for comm="df" path="/sys/fs/selinux"
      dev="selinuxfs" ino=1 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:selinuxfs:s0 tclass=dir
      
      tcontext=system_file
      avc: granted { read open } for comm="dumpstate" path="/system/lib64/hw"
      dev="dm-0" ino=1947 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:system_file:s0 tclass=dir
      
      tcontext=system_data_file
      avc: granted { read } for comm="ip" path="/data/misc/net/rt_tables"
      dev="sda10" ino=1458261 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:system_data_file:s0 tclass=file
      avc: granted { getattr } for comm="ip" path="/data/misc/net/rt_tables"
      scontext=u:r:dumpstate:s0 tcontext=u:object_r:system_data_file:s0
      tclass=file
      
      Bug: 28760354
      Test: Build policy
      Change-Id: Iae69f710d6b6dc6158cf6bb6ff61168c8df11263
      90ae4f6b
    • Jeff Vander Stoep's avatar
      Remove dumpstate selinux spam from logs · f4ce8f6c
      Jeff Vander Stoep authored
      Addresses:
      avc: granted { read } for name="pipe-max-size" dev="proc" ino=470942 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc: granted { read open } for path="/proc/sys/fs/pipe-max-size" dev="proc" ino=470942 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Test: build policy
      Change-Id: I7d8721c73c4f3c51b3885a97c697510e61d1221b
      (cherry picked from commit f44002b3)
      f4ce8f6c
  2. Jul 07, 2017
    • Dan Cashman's avatar
      Record hal_tetheroffload_service for compatibility. · 4d9f41d7
      Dan Cashman authored
      Commit: e58a8de5 added a new type
      which has no analogue in 26.0.  Record it as such.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I6b6d2aa64e0ac2c39c8d0427d333e6c7fc2b0bb1
      4d9f41d7
    • Dan Cashman's avatar
      Record memcg_device type for compat. · d0900526
      Dan Cashman authored
      Commit: 86cb5215 gave /dev/memcg a
      new label, but also explicitly prohibited access to vendor domains.
      Add the type to the 'new types' and don't map it to any other type
      for backwards compatibility.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I8902716830b162ead69834544ace9e02a94c65b4
      d0900526
    • Dan Cashman's avatar
      Record new broadcast_service type. · 255a4a72
      Dan Cashman authored
      Commit: 38f0928f added a type for a
      new system service.  This service did not exist previously, so mark
      the type as not needing any compat entry.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I52d8e144c614b27f5c52fa99be6cfac87159bbcd
      255a4a72
    • Dan Cashman's avatar
      Record new cas hwservice type. · 629c58b2
      Dan Cashman authored
      Commit: 78e595de added a new hwservice,
      which replaced a previous system service.  This effectively means we are
      deleting one object and creating a new one, so no compatibility mapping
      should be necessary since previous vendor processes trying to access the
      service will not be able to find it now independent of policy.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I6882d968dccb55561379e940f6ecb62902bb1659
      629c58b2
    • Dan Cashman's avatar
      Update 26.0 prebuilts. · 30a29946
      Dan Cashman authored
      Bug: 37896931
      Test: none, just update prebuilt.
      Change-Id: Id940d1c2bc46deab1eb49bacebbb41069e2034e4
      30a29946
    • TreeHugger Robot's avatar
      55969ec7
  3. Jul 06, 2017
Loading