- Jun 06, 2016
-
-
Ningyuan Wang authored
This allows wificond to publish binder interface using service manager. Denial warnings: wificond: type=1400 audit(0.0:8): avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 wificond: type=1400 audit(0.0:9): avc: denied { transfer } for scontext=u:r:wificond:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 servicemanager: type=1400 audit(0.0:10): avc: denied { search } for name="6085" dev="proc" ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=dir permissive=1 servicemanager: type=1400 audit(0.0:11): avc: denied { read } for name="current" dev="proc" ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=file permissive=1 servicemanager: type=1400 audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current" dev="proc" ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=file permissive=1 servicemanager: type=1400 audit(0.0:13): avc: denied { getattr } for scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process permissive=1 SELinux : avc: denied { add } for service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0 tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1 BUG=28867093 TEST=compile TEST=use a client to call wificond service through binder Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
-
- Jun 01, 2016
-
-
David Sehr authored
am: 2d759f50 * commit '2d759f50': Change-Id: Id5733bace310d6615e5cf0eedca1aedf1990b805
-
David Sehr authored
am: c6138575 * commit 'c6138575': SELinux policy for /data/misc/profman Change-Id: If6d0fd15fdba2b880bedcde2c6194aa0feb559e2
-
David Sehr authored
am: 90b00895 * commit '90b00895': Change-Id: Icf7020f3af736ace01ab6e63c0a6be1a01397a07
-
David Sehr authored
am: b8097f05 * commit 'b8097f05': SELinux policy for /data/misc/profman Change-Id: Ic2060d7a1caeb8c25c99f1dd369e80decb154ab5
-
David Sehr authored
am: a5d07925 * commit 'a5d07925': SELinux policy for /data/misc/profman Change-Id: I1329afb3191abaa1b08ce9a706228a02a0c53a47
-
David Sehr authored
am: a5d07925 * commit 'a5d07925': SELinux policy for /data/misc/profman Change-Id: I323b969ba609518da59880e47d6e13686e1203e8
-
David Sehr authored
Bug: 28748264 Change-Id: I872c25666707beb737f3ce7a4f706c0135df7ad5
-
- May 27, 2016
-
-
Marco Nelissen authored
am: 178e7960 * commit '178e7960': Change-Id: I65d074fbb98350e7633593338e04ada32510dea9
-
Marco Nelissen authored
am: 0fe95b32 * commit '0fe95b32': Remove tee_device access from mediaserver Change-Id: I38812bf082ab40fb5233b5e6db416aa5be80218f
-
Marco Nelissen authored
am: d06a58d3 * commit 'd06a58d3': Change-Id: I27074c3da5a9d75ea7268da72c90c443efaf2ed4
-
Marco Nelissen authored
am: 93330770 * commit '93330770': Remove tee_device access from mediaserver Change-Id: I845fc682c4fb86acb9acef700c0aed7415cee6e9
-
Marco Nelissen authored
am: 0e1153ec * commit '0e1153ec': Remove tee_device access from mediaserver Change-Id: I23490556a7b0b3d9a5038ff2e1b0a6f384f629ec
-
Marco Nelissen authored
am: 0e1153ec * commit '0e1153ec': Remove tee_device access from mediaserver Change-Id: I38716b448cd4a2429797bba1c420558fb7b5a64e
-
Marco Nelissen authored
-
Fyodor Kupolov authored
am: 12c58e29 * commit '12c58e29': Change-Id: If7e83bd1a45d4fb4acecbe856e779dcbd8c3e78e
-
Fyodor Kupolov authored
am: cffd143e * commit 'cffd143e': Change-Id: I1695e3c40a817aa9e3e107107a9982278049eff9
-
- May 26, 2016
-
-
Fyodor Kupolov authored
am: 92eece4b * commit '92eece4b': Allow mediaserver to read preloads_data_file Change-Id: I5efc74e0ad87ceda67b8286623f0538206e49723
-
Fyodor Kupolov authored
am: a40df202 * commit 'a40df202': Allow mediaserver to read preloads_data_file Change-Id: Ia02ce6effd43f7e92590553dedb0be81ffcb36a9
-
Fyodor Kupolov authored
am: d875ab61 * commit 'd875ab61': Allow mediaserver to read preloads_data_file Change-Id: Ia974cd2351bbebb354273816bc9693eb97a60f41
-
Fyodor Kupolov authored
am: d875ab61 * commit 'd875ab61': Allow mediaserver to read preloads_data_file Change-Id: Ib34a273c717498542d8dd197f9a2f20e674d3ce9
-
Fyodor Kupolov authored
SetupWizard initiates video playback using MediaPlayer API. Media server should be able to handle preloads file descriptors Bug: 28855287 Change-Id: I529dd39b25b852787b3d1708a853980cf382f045
-
Marco Nelissen authored
Bug: 22775369 Change-Id: Iae362fcc371bab1455dda733f408f005c7eec3f8
-
- May 24, 2016
-
-
Fyodor Kupolov authored
am: 0f283dee * commit '0f283dee': Change-Id: Idc7d5d1ee70d42bc2943d306f645362e932ac107
-
Fyodor Kupolov authored
am: 6107d75c * commit '6107d75c': SELinux policies for /data/preloads directory Change-Id: I8314aa396b57250b4779308bfe6be88cc91f36ce
-
Fyodor Kupolov authored
am: e90f1586 * commit 'e90f1586': Change-Id: I20836f7e680506fa6c61669c1ac9e30efb903115
-
Fyodor Kupolov authored
am: 72f0fbb2 * commit '72f0fbb2': SELinux policies for /data/preloads directory Change-Id: I0eb0aacd3bd5134077ef2bfbc9e5f418044043ab
-
Fyodor Kupolov authored
am: 49ac2a3d * commit '49ac2a3d': SELinux policies for /data/preloads directory Change-Id: I3ce72279ba0a054527e860b8287c1a39e8d4fcfe
-
Fyodor Kupolov authored
am: 49ac2a3d * commit '49ac2a3d': SELinux policies for /data/preloads directory Change-Id: Ib928cda316ef31f361ad09ef29b264eb9df754d5
-
Fyodor Kupolov authored
A new directory is created in user data partition that contains preloaded content such as a retail mode demo video and pre-loaded APKs. The new directory is writable/deletable by system server. It can only be readable (including directory list) by privileged or platform apps Bug: 28855287 Change-Id: I3816cd3a1ed5b9a030965698a66265057214f037
-
- May 20, 2016
-
-
Ningyuan Wang authored
This sepolicy change allows wificond to run as a deamon. BUG=28865186 TEST=compile TEST=compile with ag/1059605 Add wificond to '/target/product/base.mk' Adb shell ps -A | grep 'wificond' Change-Id: If1e4a8542ac03e8ae42371d75aa46b90c3d8545d
-
- May 17, 2016
-
-
Christopher Wiley authored
am: ccf9131c * commit 'ccf9131c': Fix rild policy to accomodate minijail Change-Id: I8d8e3f07534cf64f25e8bd3371f8c1a42385db40
-
Christopher Wiley authored
am: ef502625 * commit 'ef502625': Fix rild policy to accomodate minijail Change-Id: Ibd04bd5f94cbdd56107c8b3916cf31a0e52ced7b
-
Christopher Wiley authored
am: d5bfe93e * commit 'd5bfe93e': Fix rild policy to accomodate minijail Change-Id: Id65ff798b13903242446c27406cda10f3e02dd99
-
Christopher Wiley authored
am: e3327427 * commit 'e3327427': Fix rild policy to accomodate minijail Change-Id: I6d4e487c07f9de821d11ebee8988fa6f79ff1b27
-
Christopher Wiley authored
Fix denials related to lack of setgid and setpcap priviledges. These were introduced when minijail was used to do sandboxing. Bug: 28178548 Change-Id: I85fd4abbe55258de61d20d827baf59bbca0679e7 Test: rild no longer crash loops
-
Narayan Kamath authored
am: a1f1c4a2 * commit 'a1f1c4a2': Change-Id: I99acc4792b3ca8b667b599b736296d168730a6e2
-
Narayan Kamath authored
am: 0bc35bd3 * commit '0bc35bd3': Change-Id: Icd913a45dc2b66a50c7b75c86b512fdb63b99f8b
-
Narayan Kamath authored
am: 9f65ee3d * commit '9f65ee3d': sepolicy: broaden system_server access to foreign_dex_data_file{dir}. Change-Id: I86686234288c58cce276ab6aa956a6b27094603a
-
Narayan Kamath authored
am: 3f065aa8 * commit '3f065aa8': sepolicy: broaden system_server access to foreign_dex_data_file{dir}. Change-Id: I73420b1e5b1140d216cebad865d14fd3899578ab
-