Skip to content
Snippets Groups Projects
  1. Jun 21, 2017
  2. Jun 20, 2017
  3. Jun 19, 2017
    • TreeHugger Robot's avatar
      fbf072bc
    • Yabin Cui's avatar
      Avoid audit when running `adb shell -t run-as xxx`. · 3b7d9e49
      Yabin Cui authored
      run-as uses file descriptor created by adbd when running
      `adb shell -t run-as xxx`. It produces audit warnings like below:
      
      [ 2036.555371] c1    509 type=1400 audit(1497910817.864:238): avc: granted { use } for pid=4945 comm="run-as" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:runas:s0 tcontext=u:r:adbd:s0 tclass=fd
      
      Bug: http://b/62358246
      Test: test manually that the warning disappears.
      Change-Id: I19023ac876e03ce2afe18982fe753b07e4c876bb
      3b7d9e49
    • TreeHugger Robot's avatar
    • Tom Cherry's avatar
      Merge "Add getpgid to system_service and init" into oc-dr1-dev am: 0e6a3d87 · 471d8706
      Tom Cherry authored
      am: ac178672
      
      Change-Id: I1c7919c78b60997a5ead95e8efa604069cbc61d3
      471d8706
    • Tom Cherry's avatar
      Merge "Add getpgid to system_service and init" into oc-dr1-dev · ac178672
      Tom Cherry authored
      am: 0e6a3d87
      
      Change-Id: I3af30f8f65918e273f634a9aa120c5cbeefd3a65
      ac178672
    • Joel Galenson's avatar
      Temporarily revert back to using file_contexts for tracefs. · d0d488ee
      Joel Galenson authored
      An earlier commit moved tracefs file labels from file_contexts to
      tracefs.  But this requires a kernel patch that is not present on all
      devices, so let's revert it until that is merged.
      
      Bug: 62485981
      Test: Built, flashed, and booted two devices.  Verified that the files
      have the correct context.  Verified that traceur works.
      
      Change-Id: I8ee3ea9864f73a92943cdbc550131d4a71b842ba
      d0d488ee
    • Tom Cherry's avatar
    • Jin Qian's avatar
      allow recovery to run mke2fs tools · 7e577318
      Jin Qian authored
      recovery exec /system/bin/{mke2fs,e2fsdroid} to format userdata
      
      Bug: 35219933
      Change-Id: I77e75c2dc55d4bea7984707f27bc215de186c4d1
      7e577318
    • Dan Cashman's avatar
      Update 26.0 SELinux prebuilts. · 148578a6
      Dan Cashman authored
      More changes went into oc-dev after the freeze-date.  Reflect them.
      
      Bug: 37896931
      Test: prebuilts - none.
      Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
      148578a6
    • Tom Cherry's avatar
      Add getpgid to system_service and init · d5f0aba0
      Tom Cherry authored
      In libprocessgroup, we want to only send signals once to processes,
      particularly for SIGTERM.  We must send the signal both to all
      processes within a POSIX process group and a cgroup.  To ensure that
      we do not duplicate the signals being sent, we check the processes in
      the cgroup to see if they're in the POSIX process groups that we're
      killing.  If they are, we skip sending a second signal.  This requires
      getpgid permissions, hence this SELinux change.
      
      avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1
      avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1
      avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1
      avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1
      avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1
      avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1
      avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1
      avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1
      
      Bug: 37853905
      Bug: 62418791
      Test: Boot, kill zygote, reboot
      Change-Id: Ib6c265dbaac8833c47145ae28fb6594ca8545570
      (cherry picked from commit c59eb4d8)
      d5f0aba0
  4. Jun 16, 2017
Loading