Skip to content
Snippets Groups Projects
  1. Jan 19, 2018
  2. Jan 18, 2018
  3. Jan 17, 2018
  4. Jan 16, 2018
  5. Jan 15, 2018
    • Nathan Harold's avatar
      Allow More Apps to Recv UDP Sockets from SystemServer · ee268643
      Nathan Harold authored
      This gives the privilege to system apps, platform apps,
      ephemeral apps, and privileged apps to receive a
      UDP socket from the system server. This is being added
      for supporting UDP Encapsulation sockets for IPsec, which
      must be provided by the system.
      
      This is an analogous change to a previous change that
      permitted these sockets for untrusted_apps:
      0f75a62e
      
      Bug: 70389346
      Test: IpSecManagerTest, System app verified with SL4A
      Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
      ee268643
  6. Jan 12, 2018
    • Andreas Gampe's avatar
      Sepolicy: Allow perfprofd to contact dropbox · 3fa95acb
      Andreas Gampe authored
      Give rights to call dropbox via binder.
      
      Test: m
      Test: manual
      Change-Id: I968c432a27bc8fbe677a2dd03671908d555f9df6
      3fa95acb
    • Joel Galenson's avatar
      Improve neverallow error messages and allow disabling them on userdebug builds. · 5988b565
      Joel Galenson authored
      This patch adds a flag that can be used to ignore neverallow rules.
      By adding
      SELINUX_IGNORE_NEVERALLOWS := true
      into the BoardConfig.mk file, neverallow violations will be ignored
      silently.  This flag can only be enabled on userdebug and eng builds.
      
      Users of this flag should be very careful.  Since it does not work on
      user builds, it must be disabled to pass CTS, and enabling it for
      too long could hide issues that need to be addressed.
      
      As a happy side effect, this patch should also improve the error
      messages when violating a neverallow rules.  Specifically, the file
      and line number should be correct.
      
      Bug: 70950899
      Bug: 33960443
      Test: Built walleye-{user,eng} with and without this new option and
      a neverallow violation.  Built policy for all targets.
      
      Change-Id: Id0d65123cdd230d6b90faa6bb460d544054bb906
      5988b565
    • Tri Vo's avatar
      Files under /vendor must have attribute vendor_file_type. · 30c3c2a8
      Tri Vo authored
      Label /vendor/etc/selinux/* as vendor_configs_file.
      
      Bug: 62041836
      Test: build system/sepolicy
      Test: walleye boots
      Change-Id: I617a3287860e965c282e9e82b4375ea68dbca785
      30c3c2a8
  7. Jan 11, 2018
Loading