- Oct 16, 2017
-
-
Jin Qian authored
Allow vold/system_server to call storaged service Test: adb shell storaged -u Bug: 63740245 Change-Id: I88219e32520006db20299468b7a8c7ce0bfa58e0
-
Jin Qian authored
"storaged" service will be used by external clients, e.g. vold, dumpsys "storaged_pri" service will only be used by storaged cmdline. Bug: 63740245 Change-Id: I7a60eb4ce321aced9589bbb8474d2d9e75ab7042
-
- Oct 09, 2017
-
-
Dan Cashman authored
am: 33edd896 Change-Id: Iba4aba8833f3543d8e28c5d469667bbeb09b860e
-
Jeff Vander Stoep authored
am: 5dba5b2a Change-Id: I1f75837ba99e6dd1961a911a9ab072e26d24837d
-
Dan Cashman authored
am: 17491f6b Change-Id: I32dfe7fd082e3d7a60f0787f2c0d559d8ce252c0
-
Dan Cashman authored
am: 9cac761d Change-Id: If420befeb2ccd04e354debc8408c13edcf97dbd1
-
Dan Cashman authored
am: f3f194c0 Change-Id: Ifabe0a78658b2c903c8a2face0102b816427e3e2
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
am: d874f049 Change-Id: I0f27c558f5394f71a987a1b4b3c8de05e6348841
-
Jeff Vander Stoep authored
am: 7d610705 Change-Id: I3b770b1fb2bf8efdc45ba85536e2f990e79d99dc
-
Jeff Vander Stoep authored
am: f7196a88 Change-Id: Ib53dab06b2eae107411260d852227211bfb2ff69
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Comments indicate that these permissions are used to access already open FDs. However, getattr of a directory is clearly not necessary for that, search of system_data_file is already granted to domain and following symlinks is clearly not needed for reading an already open FD. Bug: 34980020 Test: boot marlin. Test drm with google play movies, no related denials Test: cts-tradefed run cts -m CtsMediaTestCases -t \ android.media.cts.MediaCasTest 5/6 tests fail with no related selinux denials. The same 5/6 also fail in selinux permissive mode. Change-Id: Ib4b9a1e18bdc479d656b2d64917bbc0358515525
-
Dan Cashman authored
Bug: 64687998 Test: Builds. Change-Id: I7a5b65d34382b8b76e55c523811a0f17dd9c1051
-
Tri Vo authored
Bug: 65643247 Test: sailfish boots, can take pictures, use browser without denials form kernel domain. Change-Id: I4fc0555f0b65fc5537e0b2765142b384ed0560c8
-
- Oct 08, 2017
-
-
Jeffrey Vander Stoep authored
am: 5b322d4e Change-Id: Ie584e64322009a53672cc39b671090c4523889ef
-
Jeffrey Vander Stoep authored
am: a08b925a Change-Id: Iadeb02947c4aefd1821b8e3294ad9fd801f8b0c1
-
Jeffrey Vander Stoep authored
am: 7242f168 Change-Id: Iaf37d2a4391f64fb76f1a2a51aa9077ba81be224
-
Jeffrey Vander Stoep authored
am: dcee57b8 Change-Id: I99ec6c055c8f6f04be90a4710ae278ba676f741d
-
Jeffrey Vander Stoep authored
-
- Oct 07, 2017
-
-
Nick Kralevich authored
am: 6eef5589 Change-Id: Ia61c0391c0584336bfdbe9df6f63a49275799ab3
-
Nick Kralevich authored
am: cbb0543d Change-Id: Ibf8ee8c6da1fbb3358179044c99861905751884c
-
Nick Kralevich authored
am: ea17be60 Change-Id: I04573b201588661a98b682224624bb804ec688db
-
Nick Kralevich authored
am: e22e99a6 Change-Id: I7e345f52865c834bada137d773cbcd869825946c
-
Treehugger Robot authored
-
Nick Kralevich authored
Merge "Revert "Ensure /sys restrictions for isolated_apps"" am: 3e60e38a am: 89185f5a am: 3f5bc502 am: 0011fd40 Change-Id: I24fcec7bb6943864173194a64ef7027cd52533a6
-
Nick Kralevich authored
am: 3f5bc502 Change-Id: I0c442961eab964595ad072ec1a4308a4cc2c6888
-
Nick Kralevich authored
am: 89185f5a Change-Id: Ifb9d247867381de088801abddcd16ea61201afbe
-
Nick Kralevich authored
am: 3e60e38a Change-Id: I08ed6727590cac42f6440f2462041368fc4544e2
-
Nick Kralevich authored
-
Nick Kralevich authored
Bullhead and dragon are broken. Revert until I can fix those builds. Dragon: libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26264 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; Bullhead: libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_power_management:file { ioctl read lock open }; libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_thermal:file { ioctl read lock open }; libsepol.check_assertions: 3 neverallow failures occurred This reverts commit 579366a0. Change-Id: I1ea4824e226c06628769898299f2e322060d0d06 Test: policy compiles.
-
Nick Kralevich authored
am: 91f41549 Change-Id: Ibf551367a0a6393ddf45c1e347e011a8a24627d4
-
Nick Kralevich authored
am: 1e6ca6fa Change-Id: Ic4bac09bef9e3b42115e9bf0b173831c75ee9938
-
Nick Kralevich authored
am: a2cf96bc Change-Id: I88c0a9aed3834af405b4666d04c6203c145f8214
-
Nick Kralevich authored
am: eb1ae188 Change-Id: I9f8a35d86fefecc0485cf57bc2e2cf876d770fc9
-
Treehugger Robot authored
-