- Apr 12, 2018
-
-
Jeff Vander Stoep authored
am: a3d199dd -s ours Change-Id: I09cf25b52e7c15b57e8a103d43b468dcef466154
-
Jeff Vander Stoep authored
am: 45c72ddf Change-Id: Iad601fb52e9e145b1a2729a37867de40556d9d3a
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: 96805f15 Change-Id: I862b984b3f7508406183709fffda803284aade3e
-
TreeHugger Robot authored
-
Jaekyun Seok authored
am: ac2e4cce Change-Id: I595507e45f563ae0ecfb07e842f446a34b3e3446
-
Jeff Vander Stoep authored
am: e63f0e9c Change-Id: Ib6b1721b59b6df2944584a3236076885c9218930
-
Jeff Vander Stoep authored
am: e0163411 Change-Id: I32f6cd37506d4e6f6feb73c6d1b2eabcdb4988b3
-
Treehugger Robot authored
-
- Apr 11, 2018
-
-
Jaekyun Seok authored
Bug: 75987246 Test: succeeded builing and tested with taimen Change-Id: I2d8bc91c305e665ed9c69459e51204117afb3eee
-
Jeff Vander Stoep authored
am: 1382984c Change-Id: Icc3cd3d88873627f93cb59f69083b0c68f1a51ea
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for interface=android.hardware.tetheroffload.config::IOffloadConfig scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager Bug: 77855688 Test: build/boot Sailfish, turn on tethering, no selinux denial Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f (cherry picked from commit 3a346ea7)
-
Jeff Vander Stoep authored
am: 45b4704e Change-Id: I29d90373b7cc4350244c81f9a5b24c31453d987d
-
Joel Galenson authored
am: 2e532d40 Change-Id: I7cd5f36005f7e5c26384525a038b54dac87294bd
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for interface=android.hardware.tetheroffload.config::IOffloadConfig scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager Bug: 77855688 Test: build/boot Sailfish, turn on tethering, no selinux denial Change-Id: I97cae0928b5311a4da41d19cbd5c863c3137a49f
-
Treehugger Robot authored
* changes: Suppress spurious denial Suppress spurious denial
-
Joel Galenson authored
am: 106a5b31 Change-Id: Icebdaa72e68c6ac79cc05caf53cab612addb335f
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { sys_resource } scontext=u:r:zygote:s0 tcontext=u:r:zygote:s0 tclass=capability Bug: 77905989 Test: build and flash taimen-userdebug Change-Id: If2413c3005df02a70661464d695211acbcda4094 (cherry picked from commit 816e744d998cb327fbd20f3124b22398bea2b8e4)
-
Jeff Vander Stoep authored
Addresses: avc: denied { sys_resource } for comm="ip6tables" capability=24 scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0 tclass=capability Bug: 77905989 Test: build and flash taimen-userdebug Change-Id: Ic5d7c96152b96b55255eeec00b19948f38c1923c (cherry picked from commit 443a43c9)
-
Joel Galenson authored
We have seen crash_dump denials for radio_data_file, shared_relro_file, shell_data_file, and vendor_app_file. This commit widens an existing dontaudit to include them as well as others that we might see. Bug: 77908066 Test: Boot device. Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac (cherry picked from commit a3b3bdbb)
-
Joel Galenson authored
We often see the following denials: avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0 avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0 These are benign, so we are hiding them. Bug: 37778617 Test: Boot device. Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a (cherry picked from commit bf4afae1)
-
Treehugger Robot authored
-
- Apr 10, 2018
-
-
Joel Galenson authored
am: 97e41802 Change-Id: I07a20906f2c536e573198219e4d3d567ea715144
-
Joel Galenson authored
am: 6cdc9a82 Change-Id: I3fdc8fa4f4486ccfadf785ff82e147ad47123c37
-
Treehugger Robot authored
-
Joel Galenson authored
am: b5f3e88e Change-Id: Ia52abf98b65da8309e014ac5fd3c642511e6f189
-
Joel Galenson authored
am: 354a2530 Change-Id: Iae854d7e794e9616cd1878e8096473cf9bbe0680
-
Jeff Vander Stoep authored
avc: denied { read } for name="ext4" dev="sysfs" ino=32709 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 b/72749888 avc: denied { read } for name="state" dev="sysfs" ino=51318 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_android_usb:s0 tclass=file permissive=0 b/72749888 Bug: 72749888 Test: build/boot taimen-userdebug. No more logspam Change-Id: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e Merged-In: Ic43d1c8b71e1e5e0e6f9af1e03816c4084120e7e (cherry picked from commit 558cdf1e)
-
Treehugger Robot authored
-
Joel Galenson authored
We often see the following denials: avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0 avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0 These are benign, so we are hiding them. Bug: 37778617 Test: Boot device. Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
-
Florian Mayer authored
am: bf685274 Change-Id: I2d17d76e68d60454ca53f4448a71fc619bbd5cd7
-
Florian Mayer authored
am: 589226df Change-Id: I5e6efda7d87fcffed4733058ae2fab3ff1cdaecd
-
Florian Mayer authored
-