Skip to content
Snippets Groups Projects
  1. Jun 06, 2017
  2. Jun 05, 2017
  3. Jun 03, 2017
  4. Jun 02, 2017
  5. Jun 01, 2017
  6. May 31, 2017
    • Narayan Kamath's avatar
      SEPolicy: Allow app / system_server to write to dumpstate pipes. · 32c7000e
      Narayan Kamath authored
      am: a34781ae
      
      Change-Id: Ic4103ff418e69f000198bb588f0cfccc578ba324
      32c7000e
    • Narayan Kamath's avatar
      SEPolicy: Allow app / system_server to write to dumpstate pipes. · a34781ae
      Narayan Kamath authored
      tombstoned allows dumpstate to install "intercepts" to java trace
      requests for a given process. When an "intercept" is installed, all
      trace output is redirected to a pipe provided by dumpstate instead
      of the default location (usually in /data/anr or /data/tombstone).
      
      Note that these processes are already granted "write" and "getattr"
      on dumpstate:fifo_file in order to communicate with dumpstate; this
      change adds "append" to the existing set of permissions.
      
      Bug: 32064548
      Test: manual
      Change-Id: Iccbd78c59071252fef318589f3e55ece51a3c64c
      a34781ae
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · 5e8fe834
      Narayan Kamath authored
      am: e628cb5b
      
      Change-Id: If2ce6fbf2b897d58da78430a7bae0fd6fb6e5a49
      5e8fe834
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · e628cb5b
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
      Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
      e628cb5b
  7. May 27, 2017
  8. May 26, 2017
  9. May 25, 2017
  10. May 24, 2017
  11. May 22, 2017
  12. May 18, 2017
  13. May 15, 2017
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · 1a6fabea
      Alex Vakulenko authored
      am: c4055f0d
      
      Change-Id: I4f307d49476c1e84d8dd17d02f383d7c10a959fc
      1a6fabea
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · c4055f0d
      Alex Vakulenko authored
      Specify per-service rules for PDX transport. Now being able to
      grant permissions to individual services provided by processes,
      not all services of a process.
      
      Also tighter control over which permissions are required for
      client and server for individual components of IPC (endpoints,
      channels, etc).
      
      Bug: 37646189
      Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      Merged-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      c4055f0d
  14. May 12, 2017
  15. May 11, 2017
  16. May 10, 2017
    • Tao Bao's avatar
      recovery.te: Allow setting sys.usb.ffs.ready. · ce5ca4d0
      Tao Bao authored
      This is needed for devices using configfs, where init listens for
      sys.usb.ffs.ready=1 to config usb_gadget. When recovery starts
      sideloading, minadbd (forked from recovery) sets the property to trigger
      that action.
      
      avc:  denied  { set } for property=sys.usb.ffs.ready pid=541 uid=0 gid=0
      scontext=u:r:recovery:s0 tcontext=u:object_r:ffs_prop:s0
      tclass=property_service
      
      Bug: 35803743
      Test: Device shows up in sideload mode.
      Change-Id: Ie7f1224d3a8650160ac29811f73b8286fbced4f4
      ce5ca4d0
    • Jaesoo Lee's avatar
      configstore: assign label to all minor versions of configstore service · 8741d4fe
      Jaesoo Lee authored
      am: c895f278
      
      Change-Id: I49f55fba41b5242c7c4f36652afe9fee4808a349
      8741d4fe
    • Jaesoo Lee's avatar
      configstore: assign label to all minor versions of configstore service · c895f278
      Jaesoo Lee authored
      Added rule:
      
      /(vendor|system/vendor)/bin/hw/android\.hardware\.configstore@1\.[0-9]-service
      u:object_r:hal_configstore_default_exec:s0
      
      Bug: 37727469
      Test: Built and tested on Sailfish
      Change-Id: Icf167fad1c7e601c3662f527d1e3e844ff517b58
      c895f278
Loading