- Oct 04, 2016
-
-
Jeff Vander Stoep authored
No core android component needs access to /dev/snd/{seq,timer}, but currently audioserver, bootanim, init, system_server and ueventd have access. Seq and timer have been the source of many bugs in the past [1]. Giving these files new labels without explicitly granting access removes access from audioserver, bootanim, and system_server. Init and ueventd still require access for /dev setup. TODO: Explore unsetting CONFIG_SND_TIMER device kernels. [1] https://github.com/google/syzkaller/wiki/Found-Bugs Test: media CTS "cts-tradefed run cts -m CtsMediaTestCases" on Bullhead and Dragon completed with no denials. Bug: 29045223 Change-Id: I2d069920e792ce8eef70c7b4a038b9e7000f39f5
-
- Sep 29, 2016
-
-
Iliyan Malchev authored
am: a9123b7a Change-Id: Idca8b217a18122d9cd1721c3f7d27c7cfb2d1a82
-
Iliyan Malchev authored
am: bbcfa6bb Change-Id: I8ce977417f5778883c4ed21d1cef286503816110
-
Iliyan Malchev authored
am: 13142e7b Change-Id: Ie9dc7f858e2edff0f3d5500d519f6bac39a27021
-
Iliyan Malchev authored
am: b8df90a2 Change-Id: Ic186d9506499a9666f3a548cffa3a271629f3076
-
- Sep 28, 2016
-
-
Iliyan Malchev authored
android.hardware.nfc@1.0-service is the generic binderized HIDL package implementation of android.hardware.nfc@1.0 Denials: avc: denied { read write } for pid=432 comm="android.hardwar" name="pn548" dev="tmpfs" ino=10228 scontext=u:r:android_hardware_nfc_1_0_service:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file avc: denied { search } for pid=443 comm="Binder:430_1" name="nfc" dev="dm-0" ino=670433 scontext=u:r:android_hardware_nfc_1_0_service:s0 tcontext=u:object_r:nfc_data_file:s0 tclass=dir Test: pass Change-Id: Id022b8d1706253ef65a37406c74ff883e12415b2 Signed-off-by:
Iliyan Malchev <malchev@google.com>
-
- Sep 27, 2016
-
-
Jeff Vander Stoep authored
am: 87036a35 Change-Id: Iaed4b5f3416157b51de8f2b468071c88200980fb
-
Jeff Vander Stoep authored
am: 3e5a6bd2 Change-Id: I7503b3005abb57363ecfe2496fd6cb62523622a9
-
Jeff Vander Stoep authored
am: 77346b45 Change-Id: I608384065c017aa83d951d673ff8058d61ee503f
-
Jeff Vander Stoep authored
am: 6552138b Change-Id: I68ec0acd43b5b7a1d3a434bcb4e3bbc3e2cfd67f
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Grant access to all processes and audit access. The end goal is to whitelist all access to the interpreter. Several processes including dex2oat, apps, and zygote were observed using libart, so omit them from auditing and explicitly grant them access. Test: Angler builds and boots Bug: 29795519 Change-Id: I9b93c7dbef5c49b95a18fd26307955d05a1c8e88
-
Jeff Vander Stoep authored
am: 24940b8f Change-Id: I9d029e24695a2480c2a7d4ab91787c4433561c5c
-
Jeff Vander Stoep authored
am: be4683a9 Change-Id: Ib0eedc2bd4e4b5ceeeca19d9d557daacc29ceda5
-
Jeff Vander Stoep authored
am: 62229ad3 Change-Id: I4d5b354b984eed4e9a8f6c289d7082083dd2ab7a
-
Jeff Vander Stoep authored
am: 915a1c25 Change-Id: Idefe0d2483ffba1667d85c9ec71df80f292061b8
-
Treehugger Robot authored
-
Lorenzo Colitti authored
Don't allow dumpstate to call ioctl on netlink_tcpdiag_socket. am: a8239c61 am: 1376638d am: 0a10b00e am: d0ed9d0a Change-Id: I439bd7cf7cd1e3b8d6f64357db66c44b53cca1c0
-
Lorenzo Colitti authored
am: 40196b4b Change-Id: I22a4ad5b606d8477ee9f8213f0b79c0909ccb8a4
-
Lorenzo Colitti authored
am: 0a10b00e Change-Id: I35ec7f134e24193e189d9fc7c9bd1d325b70ff6a
-
Lorenzo Colitti authored
am: b4e26018 Change-Id: I8b8826c5545a75308d3a472f00de3995ca5d01d0
-
Lorenzo Colitti authored
am: 1376638d Change-Id: Ief3104b69f825a47c68dfa1bf0c372e340fabd6d
-
Lorenzo Colitti authored
am: 1971b13e Change-Id: I63401682aafffd24793deddef6d5c63aae4ceebf
-
Lorenzo Colitti authored
am: a8239c61 Change-Id: I8f7e2d3719b3ecea40eb9db92849d827c47e0567
-
Lorenzo Colitti authored
am: bb9b4dd8 Change-Id: Iaff8ca029168072e061ba66cde1f7c0f91366ff5
-
Eric Laurent authored
am: 8b78fef9 -s ours Change-Id: I8f3892fac605ec0b897615ef3241d832ed7bb3a5
-
Lorenzo Colitti authored
This fixes the build error: ===== libsepol.report_assertion_extended_permissions: neverallowxperm on line 166 of system/sepolicy/domain.te (or line 9201 of policy.conf) violated by allow dumpstate dumpstate:netlink_tcpdiag_socket { ioctl }; libsepol.check_assertions: 1 neverallow failures occurred ===== Which is caused, in AOSP and downstream branches, by I123e5d40955358665800fe3b86cd5f8dbaeb8717. Test: builds. Change-Id: I925dec63df7c3a0f731b18093a8ac5c70167c970
-
Lorenzo Colitti authored
(cherry picked from commit 63c7ad6e) Bug: 23113288 Test: see http://ag/1476096 Change-Id: I3beb21f1af092c93eceb3d5115f823c1b993727d
-
Eric Laurent authored
am: 53452b08 Change-Id: I946eaa269356da41f98ca46d648cd7690dfa9e25
-
Eric Laurent authored
am: ef2da1d7 Change-Id: I4c2edb4452da80631675c4099d3da29adbaa5faf
-
Eric Laurent authored
am: f781f952 Change-Id: If31aa1ecf8dae506d7e556702f3ca08d0efdabc9
-
Eric Laurent authored
am: 21d78e0f Change-Id: I2f9829077cf1f48b718afefc4d7d35f92d6e73b9
-
Eric Laurent authored
am: c6effa90 Change-Id: Id257877621b9375bca7d32e68d90c7a5c2a91f5d
-
Lorenzo Colitti authored
am: c2ec7576 Change-Id: I05f71916a1e0ff7aee201db46c098ffad00920b1
-
Lorenzo Colitti authored
am: 0dbd1bc1 Change-Id: I19711aae28cb9d477248161a5ae51bbec39d9ad7
-
Lorenzo Colitti authored
am: 63c7ad6e Change-Id: I5b9383b4c50d2eecd995db6943a0a27e50fb6fdd
-
Eric Laurent authored
am: c6effa90 Change-Id: I6a381ca782c55bf504909857cde5ebca87e3bed6
-
Iliyan Malchev authored
am: 1a13b55b Change-Id: I9648192863cee89fa91f89445f414e15fec0fcac
-
Iliyan Malchev authored
am: 60fafb00 Change-Id: I46986355ea197af1d559d2b1b6111c9f1ff3a13a
-