- Dec 01, 2016
-
-
Treehugger Robot authored
-
Nick Kralevich authored
am: dd649da8 Change-Id: I648e8b2869b4b2d95255575e257f07f11153865d
- Nov 30, 2016
-
-
Nick Kralevich authored
Remove /proc/net access to domain_deprecated. Add it to domains where it was missing before. Other than these domains, SELinux denial monitoring hasn't picked up any denials related to /proc/net Bug: 28760354 Test: Device boots Test: No unexpected denials in denial collection logs. Change-Id: Ie5bfa4bc0070793c1e8bf3b00676fd31c08d426a
-
Steven Moreland authored
am: 839c7ded Change-Id: Ibbbc3e8e51cbe6a5e2f1e5be7839a1cc3341b33c
-
Max authored
Vold shouldn't have this selinux permission, so this will be left in for a few weeks to keep track of if removing it would be an issue to any other processes. If not, then a follow-up CL will remove both the rule and the auditallow Test: This CL is a test in itself, auditallow rules shouldn't change behavior of SELinux policy by themselves Bug: 26901147 Change-Id: Ib076448863bd54278df59a3b514c9e877eb22ee5
-
- Nov 29, 2016
-
-
Steven Moreland authored
Bug: 33067126 Test: Dumpstate vibrator works. Change-Id: I46ff453218ba77f156e13b448e3cba9a291df0e7
-
Daniel Rosenberg authored
am: 7b6dbd73 Change-Id: I5ba0baabf29c67d6de10b673ae9948fdab7b78bd
-
Treehugger Robot authored
-
Connor O'Brien authored
am: 280ba8b7 Change-Id: I40ea119e77002f6d71a1b0125c9420c24fc54d49
-
Connor O'Brien authored
-
Daniel Rosenberg authored
Sdcardfs now supports bind mounts and remounts instead of needing several separate mounts bug: 30954918 Test: Enable Sdcardfs, verify mounts Change-Id: Id94713752a08ceeb6aea7d3c29a29d3293a9b0c8
-
- Nov 28, 2016
-
-
William Roberts authored
am: a8340521 Change-Id: I0dc7cdaacd65f027f8615e5201f9357001e5b40b
-
Treehugger Robot authored
-
Nick Kralevich authored
am: 49e35884 Change-Id: Ib96dbc7f6467e55d595426242c59b9551e9ae75f
-
Nick Kralevich authored
Addresses the following denials and auditallows: avc: denied { read } for pid=561 comm="hwservicemanage" name="hw" dev="dm-0" ino=1883 scontext=u:r:hwservicemanager:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 avc: denied { read } for pid=748 comm="gatekeeperd" name="hw" dev="dm-0" ino=1883 scontext=u:r:gatekeeperd:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 avc: granted { read open } for pid=735 comm="fingerprintd" path="/system/lib64/hw" dev="dm-0" ino=1883 scontext=u:r:fingerprintd:s0 tcontext=u:object_r:system_file:s0 tclass=dir Test: no denials on boot Change-Id: Ic363497e3ae5078e564d7195f3739a654860a32f
-
Nick Kralevich authored
am: 8fe7b8d2 Change-Id: I904920227113f9b8e43182a4b3ba22b191cceb64
-
Nick Kralevich authored
am: 2affae65 Change-Id: I9f5c692674c60b526b0ed7ac2bc46610b9e3c5ab
-
Nick Kralevich authored
am: fae2794e Change-Id: Iba87329c6ae3de6ad95868a9237eec83fd76da05
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
William Roberts authored
commit 221938cb introduces a fix that uses braces around a single item. This is not within the normal style of no brace around a single item. Drop the braces. Change-Id: Ibeee1e682c0face97f18d5e5177be13834485676 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Nick Kralevich authored
am: 03e74a20 Change-Id: I168746eb6e2fded35d2da632731d4300522e0afd
-
Nick Kralevich authored
am: 31e9f39f Change-Id: I763244982b9e104f3a2ef68a81609db0b5ca9f39
-
Treehugger Robot authored
-
Nick Kralevich authored
Never used. Test: policy compiles. Change-Id: I0ce6c46bb05925a4b3eda83531b28f873b0c9b99
-
- Nov 27, 2016
-
-
Nick Kralevich authored
As of system/core commit a742d1027784a54c535cff69b375a9f560893155, this functionality is no longer used. Test: device boots and no obvious problems. Change-Id: Ia3ad8add92f1cdaaff36f4935be8b03458fed7f2
-
- Nov 26, 2016
-
-
Nick Kralevich authored
No denials showing up in collected audit logs. Bug: 28760354 Test: Device boots Test: No unexpected denials in denial collection logs. Change-Id: I5a0d4f3c51d296bfa04e71fc226a01dcf5b5b508
-
Nick Kralevich authored
No unexpected usages. Bug: 28760354 Test: Device boots Test: No unexpected denials in denial collection logs. Change-Id: I43226fd0b8103afb1b25b1eb21445c04bc79954e
-
Nick Kralevich authored
am: d1228f2e Change-Id: Ic825465ad7cf20ebe26cb1f0a4e6077bf3648ce9
-
Treehugger Robot authored
-
Nick Kralevich authored
auditallow has been in place since Apr 2016 (f84b7981) and no SELinux denials have been generated / collected. Remove unused functionality. Test: Device boots with no problems. Test: no SELinux denials of this type collected. Bug: 28035297 Change-Id: I52414832abb5780a1645a4df723c6f0c758eb5e6
-
- Nov 23, 2016
-
-
Nick Kralevich authored
In particular, get rid of TIOCSTI, which is only ever used for exploits. http://www.openwall.com/lists/oss-security/2016/09/26/14 Bug: 33073072 Bug: 7530569 Test: "adb shell" works Test: "adb install package" works Test: jackpal terminal emulator from https://play.google.com/store/apps/details?id=jackpal.androidterm&hl=en works Change-Id: I96b5e7059d106ce57ff55ca6e458edf5a4c393bf
-
Nick Kralevich authored
am: e6a20295 Change-Id: Ib769255c5c35ffbc47cd81c9592046b0a6282379
-
Treehugger Robot authored
-
- Nov 22, 2016
-
-
Treehugger Robot authored
-
Nick Kralevich authored
am: 0b7506ff Change-Id: I8093d316ef2f0e5839073b88351bca4eace75b7b
-
Tao Bao authored
recovery (update_binary) may need to set up cpufreq during an update. avc: denied { write } for pid=335 comm="update_binary" name="scaling_max_freq" dev="sysfs" ino=7410 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=0 Bug: 32463933 Test: Build a recovery image and apply an OTA package that writes to /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq. Change-Id: Ia90af9dd15e162dd94bcd4722b66aa296e3058c5