- Jul 15, 2014
-
-
Riley Spahn authored
Add SELinux MAC for the service manager actions list and find. Add the list and find verbs to the service_manager class. Add policy requirements for service_manager to enforce policies to binder_use macro. (cherry picked from commit b8511e0d) Change-Id: I980d4a8acf6a0c6e99a3a7905961eb5564b1be15
-
Nick Kralevich authored
Addresses the following denial: W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0 Bug: 16317188 Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
-
Ed Heyl authored
Change-Id: Ic9dde806a30d3e7b9c4a066f247a9207fe9b94b4
-
Ed Heyl authored
Change-Id: Ic8ee83ed6ffef02bddd17e1175416fc2481db7b2
-
Ed Heyl authored
Change-Id: I35be7a7df73325fba921b8a354659b2b2a3e06e7
-
Ed Heyl authored
Change-Id: Idcd252e39b2c4829201c93b6c99cf368adcb405e
-
- Jul 14, 2014
-
-
Nick Kralevich authored
Force any experimental SELinux domains (ones tagged with "permissive_or_unconfined") into unconfined. This flag is intended to be flipped when we're preparing a release, to eliminate inconsistencies between user and userdebug devices, and to ensure that we're enforcing a minimal set of rules for all SELinux domains. Without this change, our user builds will behave differently than userdebug builds, complicating testing. Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
-
- Jul 11, 2014
-
-
Sreeram Ramachandran authored
* commit '2f91ce55':
-
Nick Kralevich authored
* commit '1c7463ac':
-
Nick Kralevich authored
* commit 'ddfaf822':
-
Jeff Sharkey authored
* commit '554a8a3d':
-
Sreeram Ramachandran authored
* commit 'e4409728': Allow netd to create data files in /data/misc/net/.
-
Nick Kralevich authored
* commit 'd27aeb21': recovery: allow read access to fuse filesystem
-
Nick Kralevich authored
* commit 'd86b0a81': New domain "install_recovery"
-
Jeff Sharkey authored
* commit 'e900e573': Rules to allow installing package directories.
-
- Jul 10, 2014
-
-
Doug Zongker authored
Support opening the ffs-based interface for adbd in recovery. (Copied from adbd.te.) Bug: 16183878 Change-Id: I714ccb34f60d1413d2b184dae9b561cd06bc6b45
-
Nick Kralevich authored
* commit 'a2933b66': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '2b3c5de2': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '5b347a60': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
* commit '1d2ff869': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
ueventd is allowed to change files and directories in /sys, but not symbolic links. This is, at a minimum, causing the following denial: type=1400 audit(0.0:5): avc: denied { getattr } for comm="ueventd" path="/sys/devices/tegradc.0/driver" dev=sysfs ino=3386 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_tegradc:s0 tclass=lnk_file Allow ueventd to modify labeling / attributes of symlinks. Change-Id: If641a218e07ef479d1283f3171b2743f3956386d
-
Nick Kralevich authored
* commit '5b5ba50f': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
* commit 'b59dc27a': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
The new Nexus 5 tee implementation requires raw block I/O for anti-rollback protection. Bug: 15777869 Change-Id: I57691a9d06b5a51e2699c240783ed56e3a003396
-
Nick Kralevich authored
* commit '7e953e77': Don't use don't
-
Nick Kralevich authored
* commit 'f5835666': Don't use don't
-
Nick Kralevich authored
* commit 'f7cf7a4b': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
* commit '99d86c7a': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
Single quotes sometimes mess up m4 parsing Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
-
Nick Kralevich authored
Bug: 10243159 Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
-
Colin Cross authored
* commit 'bfd4eac7': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit 'aaaeb02e': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit '568443bc': Let DCS read staged APK clusters.
-
Colin Cross authored
* commit '5d60f04e': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit '2cd9c9bd': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit 'd3356826': Let DCS read staged APK clusters.
-
Colin Cross authored
Bug: 15313911 Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
-
- Jul 09, 2014
-
-
Jeff Sharkey authored
DCS is DefaultContainerService. avc: denied { getattr } for path="/data/app/vmdl2.tmp" dev="mmcblk0p28" ino=162910 scontext=u:r:platform_app:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir Bug: 14975160 Change-Id: Ifca9afb4e74ebbfbeb8c01e1e9ea65f5b55e9375
-
Andres Morales authored
* commit '9c52a78c': Allow SystemServer to start PersistentDataBlockService
-
Andres Morales authored
* commit 'e844113b': Allow SystemServer to start PersistentDataBlockService
-