Skip to content
Snippets Groups Projects
  1. Feb 23, 2016
  2. Feb 22, 2016
  3. Feb 19, 2016
  4. Feb 18, 2016
  5. Feb 17, 2016
  6. Feb 16, 2016
  7. Feb 13, 2016
    • Jeff Tinker's avatar
      Add mediadrm service · 0d5bac13
      Jeff Tinker authored
      Part of media security hardening
      
      This is an intermediate step toward moving
      mediadrm to a new service separate from mediaserver.
      This first step allows mediadrmservice to run based
      on the system property media.mediadrmservice.enable
      so it can be selectively enabled on devices that
      support using native_handles for secure buffers.
      
      bug: 22990512
      Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
      0d5bac13
  8. Feb 12, 2016
  9. Feb 11, 2016
  10. Feb 10, 2016
  11. Feb 09, 2016
    • Tao Bao's avatar
      update_engine: Allow to access bootctrl_block_device. · 79db4e47
      Tao Bao authored
      update_engine needs to access bootctrl_block_device to get and set the slot to boot.
      avc: denied { write } for name="mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      
      Also track the name change of the native binder service.
      avc:  denied  { add } for service=android.os.UpdateEngineService pid=210 uid=0 scontext=u:r:update_engine:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      
      Bug: 27106053
      Change-Id: Idbfef18578489db33fead0721e8f26d63db5ce09
      (cherry picked from commit 3ec34ceb)
      79db4e47
    • Andreas Gampe's avatar
      Sepolicy: Give zygote rights needed for A/B OTAs · f4bd8b30
      Andreas Gampe authored
      The zygote is reponsible for moving ART A/B OTA artifacts over to
      the regular dalvik-cache.
      
      Bug: 25612095
      Change-Id: I838d9ec6ee5a0f0af5f379a4696abda69cea51ca
      f4bd8b30
    • Marco Nelissen's avatar
      selinux rules for codec process · c3ba2e51
      Marco Nelissen authored
      Bug: 22775369
      
      Change-Id: Ic6abe3d0e18ba6f7554d027e0ec05fd19011709b
      c3ba2e51
    • William Roberts's avatar
      untrusted_app: confine filesystem creation to sandbox · db664c9e
      William Roberts authored
      
      untrusted_apps could be allowed to create/unlink files in world
      accessible /data locations. These applications could create
      files in a way that would need cap dac_override to remove from
      the system when they are uninstalled and/or leave orphaned
      data behind.
      
      Keep untrusted_app file creation to sandbox, sdcard and media
      locations.
      
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      
      (cherry picked from commit bd0768cc)
      
      Change-Id: Ideb275f696606882d8a5d8fdedb48545a34de887
      db664c9e
  12. Feb 06, 2016
Loading