- Jul 28, 2017
-
-
Philip P. Moltmann authored
Bug: 37281396 Test: cts-tradefed run cts-dev -m CtsContentTestCases --test=android.content.pm.cts.InstallSessionTransferTest Change-Id: If2094057d1acfbbf007ae108225decd9ad70e459
-
TreeHugger Robot authored
-
Tim Kryger authored
avc: denied { read } for pid=1704 comm="top" name="stat" dev="proc" ino=4026532297 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=1636 comm="dumpstate" name="lcd-backlight" dev="sysfs" ino=16592 scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file permissive=0 avc: denied { call } for pid=2230 comm="dumpsys" scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0 tclass=binder permissive=0 avc: denied { create } for pid=1700 comm="ip" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_xfrm_socket permissive=0 Bug: 62410287 Bug: 35350306 Change-Id: I65be3678c64214ebeb544e0e155bce88b21adf02 Signed-off-by:
Tim Kryger <tkryger@google.com> (cherry picked from commit b7e1f2dd)
-
Jeff Vander Stoep authored
am: 427a0c7b -s ours Change-Id: I2716725d186d6660b5a1390224fe5c06669d6485
-
Jeff Vander Stoep authored
am: faaf86bc Change-Id: I546b7be93591d638ad82978aca5f4823e7b6ab93
-
Jeffrey Vander Stoep authored
-
- Jul 27, 2017
-
-
Jeff Vander Stoep authored
Relax neverallow rule restricting binder access to/from netd so that netd can export hwbinder services to vendor components. Continue to disallow app access to netd via binder. Bug: 36682246 Test: build Merged-In: I8e558ea1add6c36b966ec1da204062ea82df3f3f Change-Id: I063df6dded94d8b0f5214b2c94c4f46bdafb03d7
-
Jeff Vander Stoep authored
Relax neverallow rule restricting binder access to/from netd so that netd can export hwbinder services to vendor components. Continue to disallow app access to netd via binder. Bug: 36682246 Test: build Change-Id: I8e558ea1add6c36b966ec1da204062ea82df3f3f (cherry picked from commit 07c650eb)
-
- Jul 26, 2017
-
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for interface=android.hardware.configstore::ISurfaceFlingerConfigs pid=603 scontext=u:r:bootanim:s0 tcontext=u:object_r:hal_configstore_ISurfaceFlingerConfigs:s0 tclass=hwservice_manager permissive=0 Bug: 64067152 Test: build Change-Id: I0605ab8ba07a46a3dc6909307e6f0b2fde68a7ba
-
- Jul 25, 2017
-
-
Michael Butler authored
Bug: 63905942 Test: mm -j40 Change-Id: I354ee863475aedd2dc9d2b436a00bcd82931456f (cherry picked from commit 4fc5fb5e521347d65dc921f8c1fb751c66f9a92c)
-
- Jul 20, 2017
-
-
Josh Gao authored
Allow mediacodec/mediaextractor to write to system_server pipes during ANR dumps. Addresses the following denials: avc: denied { write } for comm="mediaextractor" path="pipe:[1177610]" dev="pipefs" ino=1177610 scontext=u:r:mediaextractor:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0 avc: denied { write } for comm="omx@1.0-service" path="pipe:[1175808]" dev="pipefs" ino=1175808 scontext=u:r:mediacodec:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0 Bug: http://b/63801592 Test: treehugger Change-Id: I944b1fa76c70402607ccd903be17dbddeaa73201 (cherry picked from commit 3c9b9197)
-
- Jul 19, 2017
-
-
Jeff Vander Stoep authored
runas: grant access to seapp_contexts files am: dcec3ee9 -s ours am: 0da855ab -s ours am: 18e75e3a -s ours am: faf0504a -s ours Change-Id: I8da56e4bda1a86b9631b5936378ad44f4036fec2
-
Jeff Vander Stoep authored
am: 18e75e3a -s ours Change-Id: I22ef22f0146170e03a02b72f668e62067ad448af
-
Jeff Vander Stoep authored
am: 0da855ab -s ours Change-Id: Ib03ffbf671ea4e48eb3e1f6fb0045c2bc33570dc
-
Jeff Vander Stoep authored
am: dcec3ee9 -s ours Change-Id: Id04fb68971510d089e4fcd53fa24b77a1e9cd760
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
To be replaced by commit 1e149967 seapp_context: explicitly label all seapp context files Test: build policy Change-Id: I8d30bd1d50b9e4a55f878c25d134907d4458cf59 Merged-In: I0f0e937e56721d458e250d48ce62f80e3694900f
-
Jeff Vander Stoep authored
am: 3e6d842d Change-Id: I42d9ebc6231932c6e5289ad2e9e4301c256f0036
-
Jeff Vander Stoep authored
am: 89f215e6 Change-Id: I6126315b398b2f66a5a7d9c98a8d9630c01314a7
-
Jeff Vander Stoep authored
Fixes: neverallow hal_audio domain:{ tcp_socket udp_socket rawip_socket } *; Warning! Type or attribute hal_audio used in neverallow undefined in policy being checked. hal_audio_client is not used in neverallows and was mistakenly marked as expandattribute false instead of hal_audio. Fix this. Bug: 63809360 Test: build policy Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest No more: Warning! Type or attribute hal_audio used in neverallow undefined in policy being checked. Change-Id: Iedf1b80f669f95537ed201cbdbb0626e7e32be81
-
TreeHugger Robot authored
-
- Jul 18, 2017
-
-
Treehugger Robot authored
-
TreeHugger Robot authored
-
Tianjie Xu authored
am: 0b2209bf Change-Id: I2b8009c16046259a494dad10b005e3539fa24a85
-
Tianjie Xu authored
am: b197b7c8 Change-Id: I77d33dec14641856fba474c16b7b98815313a049
-
Tianjie Xu authored
am: 0bcb2030 Change-Id: I9937141ff425f437d46463bdb944e4524f8d8aa1
-
Tianjie Xu authored
am: 8f687053 Change-Id: Ib0ba78601046e6574cbb44752ebc431791a62df6
-
Max Bires authored
This is needed for timerslack functionality which should be present in most kernels going forward Test: system_server can write to cameraserver files Change-Id: I85797128b1467d92eb354364de8eb60f8e45c931
-
Dan Cashman authored
This type was removed in commit: 93166cef and no longer needs to be included in compatibility infrastructure. Bug: 62573845 Test: None, prebuilt change. Change-Id: I9dc05512c7fcb3ef4445c4c6b040809a1d595282
- Jul 17, 2017
-
-
Ranjith Kagathi Ananda authored
Remove restriction to restrict only domains in AOSP to use the untrusted_app_all attribute BUG=63167163 Test: Sanity check Change-Id: I9e1b8605fad108f45f988d8198a9a1cadb8dfa5e
-
TreeHugger Robot authored
-
- Jul 16, 2017
-
-
Tianjie Xu authored
The denial message: update_engine: type=1400 audit(0.0:15213): avc: denied { getattr } for path="/postinstall" dev="dm-0" ino=38 scontext=u:r:update_engine:s0 tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0 update_engine: type=1400 audit(0.0:15214): avc: denied { sys_rawio } for capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0 auditd : type=1400 audit(0.0:15213): avc: denied { getattr } for comm="update_engine" path="/postinstall" dev="dm-0" ino=38 scontext=u:r:update_engine:s0 tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0 update_engine: [0428/070905:ERROR:utils.cc(716)] Error stat'ing /postinstall: Permission denied Bug: 37760573 Test: apply an update and UE reads postinstall_mnt_dir without denial. Change-Id: I55506f5e8544233f60ccf7c1df846c9c93946a25
-
Lorenzo Colitti authored
am: 61b0d710 Change-Id: I3f3ecd781d085fabe9d733f44ae33e4412fc2288
-
Lorenzo Colitti authored
am: a0804de2 Change-Id: I1c39dedf06bf0e791fc885c535c47ab410fa1905
-
Lorenzo Colitti authored
am: f692d2fd Change-Id: Id32185a33372c762a149bf78f73330588af55685
-