Skip to content
Snippets Groups Projects
  1. Feb 18, 2016
  2. Feb 17, 2016
  3. Feb 16, 2016
  4. Feb 13, 2016
    • Jeff Tinker's avatar
      Add mediadrm service · 0d5bac13
      Jeff Tinker authored
      Part of media security hardening
      
      This is an intermediate step toward moving
      mediadrm to a new service separate from mediaserver.
      This first step allows mediadrmservice to run based
      on the system property media.mediadrmservice.enable
      so it can be selectively enabled on devices that
      support using native_handles for secure buffers.
      
      bug: 22990512
      Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
      0d5bac13
  5. Feb 12, 2016
  6. Feb 11, 2016
  7. Feb 10, 2016
  8. Feb 09, 2016
    • Tao Bao's avatar
      update_engine: Allow to access bootctrl_block_device. · 79db4e47
      Tao Bao authored
      update_engine needs to access bootctrl_block_device to get and set the slot to boot.
      avc: denied { write } for name="mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      
      Also track the name change of the native binder service.
      avc:  denied  { add } for service=android.os.UpdateEngineService pid=210 uid=0 scontext=u:r:update_engine:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      
      Bug: 27106053
      Change-Id: Idbfef18578489db33fead0721e8f26d63db5ce09
      (cherry picked from commit 3ec34ceb)
      79db4e47
    • Andreas Gampe's avatar
      Sepolicy: Give zygote rights needed for A/B OTAs · f4bd8b30
      Andreas Gampe authored
      The zygote is reponsible for moving ART A/B OTA artifacts over to
      the regular dalvik-cache.
      
      Bug: 25612095
      Change-Id: I838d9ec6ee5a0f0af5f379a4696abda69cea51ca
      f4bd8b30
    • Marco Nelissen's avatar
      selinux rules for codec process · c3ba2e51
      Marco Nelissen authored
      Bug: 22775369
      
      Change-Id: Ic6abe3d0e18ba6f7554d027e0ec05fd19011709b
      c3ba2e51
    • William Roberts's avatar
      untrusted_app: confine filesystem creation to sandbox · db664c9e
      William Roberts authored
      
      untrusted_apps could be allowed to create/unlink files in world
      accessible /data locations. These applications could create
      files in a way that would need cap dac_override to remove from
      the system when they are uninstalled and/or leave orphaned
      data behind.
      
      Keep untrusted_app file creation to sandbox, sdcard and media
      locations.
      
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      
      (cherry picked from commit bd0768cc)
      
      Change-Id: Ideb275f696606882d8a5d8fdedb48545a34de887
      db664c9e
  9. Feb 06, 2016
  10. Feb 05, 2016
Loading