- Jul 25, 2014
-
-
Nick Kralevich authored
Change-Id: I16eca0cac13042f9ed2e1484e6aa25f233508aa9
-
Nick Kralevich authored
* commit '1a61fb3b': Allow sdcardd to read /data/.layout_version
-
Nick Kralevich authored
As described in the system/core commit with the same Change-Id, there's a race condition between installd and sdcard when it comes to accessing /data/media. Resolve the race by checking /data/.layout_version to make sure the filesystem has been upgraded. Maybe indirectly fixes the following SELinux denial: sdcard : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir (cherrypicked from commit 792d8650) Bug: 16329437 Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
-
Narayan Kamath authored
* commit 'aa8e657e': Revert "fix system_server dex2oat exec"
-
Narayan Kamath authored
This reverts commit 10370f5f. The underlying issue has been fixed and the system_server will now go via installd to get stuff compiled, if required. bug: 16317188 Change-Id: I77a07748a39341f7082fb9fc9792c4139c90516d
-
Nick Kralevich authored
* commit '792d8650': Allow sdcardd to read /data/.layout_version
-
Nick Kralevich authored
As described in the system/core commit with the same Change-Id, there's a race condition between installd and sdcard when it comes to accessing /data/media. Resolve the race by checking /data/.layout_version to make sure the filesystem has been upgraded. Maybe indirectly fixes the following SELinux denial: sdcard : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir Bug: 16329437 Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
-
- Jul 24, 2014
-
-
Stephen Smalley authored
* commit 'ba992496': Define debuggerd class, permissions, and rules.
-
Christopher Ferris authored
* commit '12b8f79d': Allow dumpstate to read /data/tombstones.
-
Stephen Smalley authored
Define a new class, permissions, and rules for the debuggerd SELinux MAC checks. Used by Ib317564e54e07cc21f259e75124b762ad17c6e16 for debuggerd. Change-Id: I8e120d319512ff207ed22ed87cde4e0432a13dda Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Christopher Ferris authored
Change-Id: Iad32cfb4d5b69176fc551b8339d84956415a4fe7
-
- Jul 23, 2014
-
-
Christopher Ferris authored
Change-Id: Ifb5d9765b08217307a6b7bc5a0b3215d48c2985b
-
Nick Kralevich authored
-
- Jul 24, 2014
-
-
Riley Spahn authored
Add policies supporting SELinux MAC in DrmManagerservice. Add drmservice class with verbs for each of the functions exposed by drmservice. Change-Id: Ib758a23302962f41e5103c4853c65adea3a5994e
-
- Jul 23, 2014
-
-
Christopher Ferris authored
Change-Id: Iad32cfb4d5b69176fc551b8339d84956415a4fe7
-
- Jul 22, 2014
- Jul 21, 2014
-
-
Stephen Smalley authored
* commit '9d2703a5': Prohibit execute to fs_type other than rootfs for most domains.
-
Stephen Smalley authored
Augment the already existing neverallow on loading executable content from file types other than /system with one on loading executable content from filesystem types other than the rootfs. Include exceptions for appdomain and recovery as required by current policy. Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov> (cherry picked from commit 4644ac48) Change-Id: I5e2609a128d1bf982a7a5c3fa3140d1e9346c621
-
Colin Cross authored
* commit '3cfc7ea8': sepolicy: allow charger to read /sys/fs/pstore/console-ramoops
-
Colin Cross authored
Addresses the denial in charger mode: [ 17.993733] type=1400 audit(1405412231.119:4): avc: denied { search } for pid=123 comm="charger" name="/" dev="pstore" ino=10287 scontext=u:r:healthd:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=0 (cherry picked from commit bb96bffc) Change-Id: I2dde6adc3ff99df99409d4da3ef32c3987228801
-
Colin Cross authored
* commit 'bb96bffc': sepolicy: allow charger to read /sys/fs/pstore/console-ramoops
-
Colin Cross authored
Addresses the denial in charger mode: [ 17.993733] type=1400 audit(1405412231.119:4): avc: denied { search } for pid=123 comm="charger" name="/" dev="pstore" ino=10287 scontext=u:r:healthd:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=0 Change-Id: I95e65753a99aa61ef86b8eebb7083b3d450e6b7b
-
Stephen Smalley authored
* commit '4644ac48': Prohibit execute to fs_type other than rootfs for most domains.
-
Stephen Smalley authored
Augment the already existing neverallow on loading executable content from file types other than /system with one on loading executable content from filesystem types other than the rootfs. Include exceptions for appdomain and recovery as required by current policy. Change-Id: I73d70ab04719a67f71e48ac795025f2ccd5da385 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Jul 18, 2014
-
-
Ye Wen authored
-
- Jul 21, 2014
-
-
Ye Wen authored
b/16324360 Change-Id: If79f293a547deef570a80a5569ff8eb973ce29be
-
- Jul 18, 2014
-
-
Riley Spahn authored
* commit 'bf696327': DO NOT MERGE: Remove service_manager audit_allows.
-
Riley Spahn authored
Remove the audit_allow rules from lmp-dev because we will not be tightening any further so these logs will not be useful. Change-Id: Ibd0e4bf4e8f4f5438c3dbb9114addaadac9ef8c9
-
Riley Spahn authored
* commit '4a24475b': Further refined service_manager auditallow statements.
-
Riley Spahn authored
Further refined auditallow statements associated with service_manager and added dumpstate to the service_manager_local_audit_domain. (cherry picked from commit 603bc205) Change-Id: Ib8894aa70aa300c14182a6c934dd56c08c82b05f
-
Nick Kralevich authored
* commit '958ef563': Further refined service_manager auditallow statements.
-
Riley Spahn authored
* commit '14aa7c06': Refine service_manager find auditallow statements.
-
- Jul 17, 2014
-
-
Riley Spahn authored
Add adbd as a service_manager_local_audit_domain and negate surfaceflinger_service in its auditallow. Negate keystore_service and radio_service in the system_app auditallow. (cherry picked from commit 88157ea3) Change-Id: I25354db2add3135335c80be2c2d350e526137572
-
Riley Spahn authored
* commit '88157ea3': Refine service_manager find auditallow statements.
-