Skip to content
Snippets Groups Projects
  1. Nov 14, 2018
  2. Nov 13, 2018
    • Risan's avatar
      SELinux changes for AppFuse · 0c1848b1
      Risan authored
      We are moving AppFuse mount from system_server's mount namespace to
      vold. Hence, we could reduce the SELinux permissions given to
      system_server, in the expense of adding allow rules to vold and
      letting appdomain have access to vold's fd.
      
      Bug: 110379912
      Test: testOpenProxyFileDescriptor passes (after vold and
      system_server code changes)
      
      Change-Id: I827a108bd118090542354360a8c90b295e6a0fef
      0c1848b1
    • Jiyong Park's avatar
      Move file_contexts for APEXes to under /system/sepolicy · 03ccac0e
      Jiyong Park authored
      For centralized development of sepolices, file_contexts files for APEXes
      are all moved to under /system/seplicy.
      
      Bug: 119034475
      Bug: 113373927
      Test: m apex.test com.android.tzdata com.android.runtime com.android.media
      Change-Id: I9bf4874793db4dbdb75cbd759ae95f72d7281007
      03ccac0e
    • Nick Kralevich's avatar
      OWNERS: add cbrubaker · a106218c
      Nick Kralevich authored
      He's already listed as an authorized +2er in
      https://android-review.googlesource.com/admin/groups/810,members
      
      Test: none
      Change-Id: Ifff6b3f8353d562b3386d0c2e3b575154f173e23
      a106218c
  3. Nov 12, 2018
  4. Nov 10, 2018
    • Nick Kralevich's avatar
      bluetooth: allow TUNGETIFF TUNSETIFF · 049c03d8
      Nick Kralevich authored
      system/sepolicy commit 619c1ef2 started
      enforcing ioctl whitelisting requirements for /dev/tun. Bluetooth needs
      the ability to issue TUNSETIFF on /dev/tun, so allow access. We also
      allow access to TUNGETIFF for good measure.
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=20047 ioctlcmd=0x54ca scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0
      
      Test: policy compiles
      Change-Id: Ie4c138fc774373cec266c59de6663db147d60423
      049c03d8
  5. Nov 09, 2018
  6. Nov 08, 2018
  7. Nov 07, 2018
  8. Nov 06, 2018
Loading