Skip to content
Snippets Groups Projects
  1. Mar 07, 2016
  2. Mar 02, 2016
  3. Mar 01, 2016
    • Calin Juravle's avatar
      Add SElinux policies to allow foreign dex usage tracking. · 837bc42f
      Calin Juravle authored
      This is a special profile folder where apps will leave profile markers
      for the dex files they load and don't own. System server will read the
      markers and decide which apk should be fully compiled instead of
      profile guide compiled.
      
      Apps need only to be able to create (touch) files in this directory.
      System server needs only to be able to check wheter or not a file with a
      given name exists.
      
      Bug: 27334750
      Bug: 26080105
      
      Change-Id: I2256e4aba1ec0e5117de6497123223b9a74f404e
      837bc42f
  4. Feb 29, 2016
    • Nick Kralevich's avatar
      Allow bluetooth access to the tun device. · ba12da95
      Nick Kralevich authored
      Bluetooth uses the tun device for tethering. Allow access.
      
        STEPS TO REPRODUCE:
        0. Have two devices to test on, say Device A and Device B
        1. On Device A, Go to settings ->Bluetooth .
        2. Turn on the Bluetooth .
        3. Pair it with device B
        4. Tap on the paired device
      
        OBSERVED RESULTS:
        -Bluetooth share crash is observed with "Bluetooth share has stopped"
        error message
        -Unable to use Bluetooth tethering due to this issue
      
        EXPECTED RESULTS:
        No crash and Bluetooth devices should be able to connect for tethering
      
      Addresses the following denial:
      
      com.android.bluetooth: type=1400 audit(0.0:131): avc: denied { open }
      for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs"
      ino=12340 scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0
      tclass=chr_file permissive=0
      
      Bug: 27372573
      
      (cherry picked from commit 9a1347ee)
      
      Change-Id: Ibd16e48c09fe80ebb4f3779214de3b4806c12497
      ba12da95
  5. Feb 28, 2016
  6. Feb 27, 2016
    • Nick Kralevich's avatar
      Don't allow permissive SELinux domains on user builds. · 3df1fda5
      Nick Kralevich authored
      It's a CTS requirement that all SELinux domains be in
      enforcing mode. Add the same assertion to the build system
      when targeting user builds.
      
      In particular, this avoids a situation where device integrity
      checking is enabled on user builds, but permissive denials
      are being generated, causing the device to unexpectedly reboot
      into safe mode.
      
      A developer wanting to put an SELinux domain into permissive
      mode for userdebug/eng purposes can write the following
      in their policy:
      
        userdebug_or_eng(`
          permissive foo;
        ')
      
      Bug: 26902605
      Bug: 27313768
      
      (cherry picked from commit bca98efa)
      
      Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
      3df1fda5
    • Jeff Tinker's avatar
    • Jeff Tinker's avatar
      Allow mediadrmserver to access media files · 05aa151c
      Jeff Tinker authored
      bug: 26782004
      Change-Id: Ie3d9289d15446efa160550185a2d565e3be2980f
      05aa151c
    • Fyodor Kupolov's avatar
      Add NetworkTimeUpdateService · 3d564e52
      Fyodor Kupolov authored
      NetworkTimeUpdateService has been registered as a system service, so that
      its dump state can be included into bugreports.
      
      Bug: 23983739
      Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
      3d564e52
  7. Feb 26, 2016
  8. Feb 25, 2016
  9. Feb 24, 2016
  10. Feb 23, 2016
  11. Feb 22, 2016
Loading