Skip to content
Snippets Groups Projects
  1. Jan 09, 2019
  2. Jan 08, 2019
  3. Jan 07, 2019
  4. Jan 03, 2019
    • Jiyong Park's avatar
      Label the dynamic linker in the runtime APEX correctly · 048e1366
      Jiyong Park authored
      e2bc9fe9d5ac82457bc6050bf705ff43a1b05cbf in platform/art project added
      the dynamic linker to the runtime APEX. Since the dynamic linker has
      been labeled as 'system_linker_exec' so does the linker in the APEX.
      
      Bug: 120266448
      Test: ls -Z /apex/com.android.runtime/bin/linker
      u:object_r:system_linker_exec:s0 /apex/com.android.runtime/bin/linker
      
      Change-Id: I243b86a74d94058b3283830c32232c6584639ff3
      048e1366
  5. Jan 02, 2019
    • Joel Galenson's avatar
      Allow dumpstate to read sysfs_loop files. · f0264fe2
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: Ie190bfa62cf5aa172ebfff8bfd82dea2a7d1a016
      f0264fe2
  6. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  7. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  8. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  9. Dec 22, 2018
  10. Dec 21, 2018
  11. Dec 20, 2018
    • Joel Galenson's avatar
      Add Adam to OWNERS. · 0e25fb85
      Joel Galenson authored
      Test: None.
      Change-Id: Ie317dbdf96de32d8129da15fa0d771caa4ebca9d
      0e25fb85
    • Treehugger Robot's avatar
    • Sudheer Shanka's avatar
      Allow vold to create files at /mnt/user/.* · f0abbf97
      Sudheer Shanka authored
      Bug: 121099965
      Test: manual
      Change-Id: I940868eb984399763d7346a201e37cb07fb12333
      f0abbf97
    • Todd Kennedy's avatar
      Open permission manager service to the world · 2ec03885
      Todd Kennedy authored
      There are many permission related APIs currently handled by the
      package manager service. These are simply pass throughs from the
      package manager service to an internal API defined by the
      permission manager service. Instead of this multi-hop, we want
      to open the permission manager service directly to apps. For
      legacy, we won't be able to remove the APIs from PackageManager,
      but, the implementation should go directly to the Permission
      Manager Service.
      
      Test: System boots w/o selinux denials
      Change-Id: I1d953077b3da18ccf44deb85b9084be68a2179bd
      2ec03885
Loading