- Apr 12, 2018
-
-
Jaekyun Seok authored
am: ac2e4cce Change-Id: I595507e45f563ae0ecfb07e842f446a34b3e3446
-
Jeff Vander Stoep authored
am: e63f0e9c Change-Id: Ib6b1721b59b6df2944584a3236076885c9218930
-
Jeff Vander Stoep authored
am: e0163411 Change-Id: I32f6cd37506d4e6f6feb73c6d1b2eabcdb4988b3
-
Treehugger Robot authored
-
- Apr 11, 2018
-
-
Jaekyun Seok authored
Bug: 75987246 Test: succeeded builing and tested with taimen Change-Id: I2d8bc91c305e665ed9c69459e51204117afb3eee
-
Jeff Vander Stoep authored
am: 1382984c Change-Id: Icc3cd3d88873627f93cb59f69083b0c68f1a51ea
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for interface=android.hardware.tetheroffload.config::IOffloadConfig scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager Bug: 77855688 Test: build/boot Sailfish, turn on tethering, no selinux denial Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f (cherry picked from commit 3a346ea7)
-
Jeff Vander Stoep authored
am: 45b4704e Change-Id: I29d90373b7cc4350244c81f9a5b24c31453d987d
-
Joel Galenson authored
am: 2e532d40 Change-Id: I7cd5f36005f7e5c26384525a038b54dac87294bd
-
Treehugger Robot authored
* changes: Suppress spurious denial Suppress spurious denial
-
Joel Galenson authored
am: 106a5b31 Change-Id: Icebdaa72e68c6ac79cc05caf53cab612addb335f
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { sys_resource } scontext=u:r:zygote:s0 tcontext=u:r:zygote:s0 tclass=capability Bug: 77905989 Test: build and flash taimen-userdebug Change-Id: If2413c3005df02a70661464d695211acbcda4094 (cherry picked from commit 816e744d998cb327fbd20f3124b22398bea2b8e4)
-
Jeff Vander Stoep authored
Addresses: avc: denied { sys_resource } for comm="ip6tables" capability=24 scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0 tclass=capability Bug: 77905989 Test: build and flash taimen-userdebug Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c (cherry picked from commit 443a43c9)
-
Joel Galenson authored
We have seen crash_dump denials for radio_data_file, shared_relro_file, shell_data_file, and vendor_app_file. This commit widens an existing dontaudit to include them as well as others that we might see. Bug: 77908066 Test: Boot device. Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac (cherry picked from commit a3b3bdbb)
-
Joel Galenson authored
We often see the following denials: avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0 avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0 These are benign, so we are hiding them. Bug: 37778617 Test: Boot device. Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a (cherry picked from commit bf4afae1)
-
Treehugger Robot authored
-
- Apr 10, 2018
-
-
Joel Galenson authored
am: 97e41802 Change-Id: I07a20906f2c536e573198219e4d3d567ea715144
-
Joel Galenson authored
am: 6cdc9a82 Change-Id: I3fdc8fa4f4486ccfadf785ff82e147ad47123c37
-
Treehugger Robot authored
-
Joel Galenson authored
am: b5f3e88e Change-Id: Ia52abf98b65da8309e014ac5fd3c642511e6f189
-
Joel Galenson authored
am: 354a2530 Change-Id: Iae854d7e794e9616cd1878e8096473cf9bbe0680
-
Treehugger Robot authored
-
Joel Galenson authored
We often see the following denials: avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0 avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0 These are benign, so we are hiding them. Bug: 37778617 Test: Boot device. Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
-
Florian Mayer authored
am: bf685274 Change-Id: I2d17d76e68d60454ca53f4448a71fc619bbd5cd7
-
Florian Mayer authored
am: 589226df Change-Id: I5e6efda7d87fcffed4733058ae2fab3ff1cdaecd
-
Florian Mayer authored
-
Florian Mayer authored
Without this, we only have visibility into writes. Looking at traces, we realised for many of the files we care about (.dex, .apk) most filesystem events are actually reads. See aosp/661782 for matching filesystem permission change. Bug: 73625480 Change-Id: I6ec71d82fad8f4679c7b7d38e3cb90aff0b9e298
-
Joel Galenson authored
We have seen crash_dump denials for radio_data_file, shared_relro_file, shell_data_file, and vendor_app_file. This commit widens an existing dontaudit to include them as well as others that we might see. Test: Boot device. Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
-
- Apr 09, 2018
-
-
Max Bires authored
This will allow adb shell getprop ro.vendor.build.security_patch to properly return the correct build property, whereas previously it was offlimits due to lack of label. Test: adb shell getprop ro.vendor.build.security_patch successfully returns whatever VENDOR_SECURITY_PATCH is defined to be in the Android .mk files Change-Id: Ie8427738125fc7f909ad8d51e4b76558f5544d49
-
Jeff Vander Stoep authored
am: 2ccd99a5 Change-Id: I0e4eacb9cce9c995bf773176638a46af0e92af0a
-
Jeff Vander Stoep authored
avc: denied { read } for comm="batterystats-wo" name="show_stat" dev="sysfs" scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file Bug: 77816522 Test: build Change-Id: I50a9bfe1a9e4df9c84cf4b2b4aedbb8f82ac94cd
-