Skip to content
Snippets Groups Projects
  1. Apr 06, 2018
    • Yifan Hong's avatar
    • Yifan Hong's avatar
      hal_health: allow to write kernel logs. · 306b2671
      Yifan Hong authored
      This is originally allowed in healthd but the permission
      was not transfered to health HAL. A typical health HAL
      implementation is likely to write battery info to kernel
      logs.
      
      Test: device has battery kernel logs with health HAL
            but without healthd
      
      Bug: 77661605
      
      Change-Id: Ib3b5d3fe6bdb3df2a240c85f9d27b863153805d2
      306b2671
    • Florian Mayer's avatar
      Grant traced_probes search on directories. · 269c9665
      Florian Mayer authored
      This is needed to be able to scan the labels we have
      permission on.
      
      Denial:
      
      04-06 12:52:22.674   874   874 W traced_probes: type=1400 audit(0.0:10314): avc: denied { search } for name="backup" dev="sda45" ino=6422529 scontext=u:r:traced_probes:s0 tcontext=u:object_r:backup_data_file:s0 tclass=dir permissive=0
      
      Bug: 73625480
      
      cherry-picked from aosp/658243
      Change-Id: I52f3865952004bfc6fe22c488d768276866f8ae1
      Merged-In: I52f3865952004bfc6fe22c488d768276866f8ae1
      269c9665
  2. Apr 05, 2018
  3. Apr 04, 2018
  4. Apr 03, 2018
  5. Apr 02, 2018
  6. Mar 31, 2018
  7. Mar 30, 2018
  8. Mar 29, 2018
  9. Mar 28, 2018
    • Yi Jin's avatar
      Allow incidentd to read LAST_KMSG only for userdebug builds · 4f69d912
      Yi Jin authored
      Bug: 73354384
      Test: manual
      Change-Id: I4fa630624cc247275e11965471461502f451edf4
      4f69d912
    • TreeHugger Robot's avatar
      Merge "Hide some denials." into pi-dev · eee056d5
      TreeHugger Robot authored
      eee056d5
    • Joel Galenson's avatar
      Hide some denials. · a66d1a45
      Joel Galenson authored
      These denials occur fairly often, causing some logspam.
      
      Bug: 77225170
      Test: Boot device.
      Change-Id: Icd73a992aee44007d0873743f706758f9a19a112
      a66d1a45
    • Alan Stokes's avatar
      Stop O_CREAT logspam in permissive mode. · 7d4294cb
      Alan Stokes authored
      In permissive mode we get more spurious denials when O_CREAT is used
      with an already-existing file. They're harmless so we don't need to
      audit them.
      
      Example denials:
      denied { add_name } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
      denied { create } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
      
      Bug: 72643420
      Bug: 74182216
      
      Test: Device boots, denials gone.
      Change-Id: I54b1a0c138ff5167f1d1d12c4b0b9e9afaa5bca0
      7d4294cb
Loading