Skip to content
Snippets Groups Projects
  1. Sep 14, 2016
  2. Sep 13, 2016
  3. Sep 12, 2016
    • Narayan Kamath's avatar
      Allow the zygote to stat all files it opens. · 221938cb
      Narayan Kamath authored
      (cherry picked from commit 63203a01)
      
      bug: 30963384
      Change-Id: I62b5ffd43469dbb0bba67e1bb1d3416e7354f9e5
      221938cb
    • Amith Yamasani's avatar
      Allow apps to read preloaded photos · aa2a33a2
      Amith Yamasani authored
      (cherry picked from commit e01654f9)
      
      For Retail Demo mode, we need to preload photos in
      /data/preloads and allow regular apps to access the
      photos returned by the media provider from the preloads
      directory.
      
      Bug: 29940807
      Change-Id: Ic1061dac55ace1b125ae04b5b0c70aae9aa0c732
      aa2a33a2
    • Andreas Gampe's avatar
      Sepolicy: Adapt for new A/B OTA flow · 03daf853
      Andreas Gampe authored
      (cherry picked from commit d47c1e93)
      
      To include target slot names in the naming of A/B OTA artifacts,
      and new path has been implemented. Instead of passing through
      the system server and forking off of installd, otapreopt_chroot
      is now driven directly from the otapreopt script.
      
      Change the selinux policy accordingly: allow a transition from
      postinstall to otapreopt_chroot, and let otapreopt_chroot inherit
      the file descriptors that update_engine had opened (it will close
      them immediately, do not give rights to the downstream executables
      otapreopt and dex2oat).
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: I6b476183572c85e75eda4d52f60e4eb5d8f48dbb
      03daf853
    • David Brazdil's avatar
      dumpstate: Change SELinux policy to allow reading /data/misc/profiles · aa6308fc
      David Brazdil authored
      (cherry picked from commit cf63957d)
      
      This is needed in order to include profile files in bugreports.
      
      Bug: 28610953
      Change-Id: I025189a4ac66b936711fdb4e20b10c2b0a7427d1
      aa6308fc
    • Jeff Vander Stoep's avatar
      drmserver: read locked ringtones · 188f9b14
      Jeff Vander Stoep authored
      (cherry picked from commit f23b870a)
      
      avc: denied { read } for comm="generic" path="/data/system_de/0/ringtones/ringtone_cache" dev="sda35" ino=1114120 scontext=u:r:drmserver:s0 tcontext=u:object_r:ringtone_file:s0 tclass=file
      
      Change-Id: I40992733d779743be92c15a094d166a3df64a10f
      Fixes: 30167454
      188f9b14
    • Alex Light's avatar
      Allow cppreopts to work with selinux · b7ebb32f
      Alex Light authored
      (cherry picked from commit d3edd6b5)
      
      Bug: 29278988
      Change-Id: I199572377a6b5c33116c718a545159ddcf50df30
      b7ebb32f
    • Geoffrey Pitsch's avatar
      Allow audioserver for bootanim. · 54061dd1
      Geoffrey Pitsch authored
      (cherry picked from commit ad5b4be3)
      
      Required for using native audio in BootAnimation
      
      Bug: 29055299
      Change-Id: Ie75d35219be95a8dc697cc3c0384a4de90ea3478
      54061dd1
    • Jeffrey Vander Stoep's avatar
      Merge changes from topic 'blacklist_app_data_execute' · 72a2d64d
      Jeffrey Vander Stoep authored
      * changes:
        fix build: exclude bluetooth from neverallow restriction
        Remove platform_app from neverallow execute from /data
        Rework neverallow for /data execute permission
      72a2d64d
    • Christopher Wiley's avatar
      Add back fowner capability to netd · 28029706
      Christopher Wiley authored
      This addresses error messages like:
      
      11-30 18:00:15.196  6917  6917 W Binder:6596_2: type=1400 audit(0.0:46):
      avc: denied { fowner } for capability=3 scontext=u:r:netd:s0
      tcontext=u:r:netd:s0 tclass=capability permissive=0
      
      11-30 18:00:15.200  6596  6917 E /system/bin/netd:
      android::WriteStringToFile fchmod failed: Operation not permitted
      
      11-30 18:00:15.200  6596  6917 E Netd    : failed to write to
      /data/misc/net/rt_tables (Operation not permitted)
      
      Bug: 31147892
      Change-Id: Id11704f8e2b8c08db92de374ed44913b70d6ae66
      28029706
Loading