- Mar 25, 2016
-
-
Nick Kralevich authored
There are now individual property files to control access to properties. Don't allow processes other than init to write to these property files. Change-Id: I184b9df4555ae5051f9a2ba946613c6c5d9d4403
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
(cherry picked from commit f2d07904) /dev/uio uio_device is already declared. Accessing uio through /sys is also common. Bug: 26990688 Change-Id: I3db941161dae31d3b87f265708abbcd9171a2c1f
-
Pierre Imai authored
-
- Mar 24, 2016
-
-
Mark Salyzyn authored
-
Mark Salyzyn authored
(cherry pick from commit 16fe52c9) One time executables. recovery_refresh can be used at any time to ensure recovery logs in pmsg are re-placed at the end of the FIFO. recovery_persist takes the recovery logs in pmsg and drops them into /data/misc/recovery/ directory. Bug: 27176738 Change-Id: Ife3cf323930fb7a6a5d1704667961f9d42bfc5ac
-
dcashman authored
sysfs_thermal nodes are common enough to warrant an entry in global policy and the new HardwarePropertiesManagerService exists explicitly to expose some of this information. Address the following denials: avc: denied { search } for name="thermal" dev="sysfs" ino=17509 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=1 avc: denied { read } for name="temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 Bug: 27809332 Change-Id: I2dbc737971bf37d197adf0d5ff07cb611199300d
-
Pierre Imai authored
Change-Id: I0c0bce9cd50a25897f5c4521ee9b4fada6648a59
-
- Mar 22, 2016
-
-
Nick Kralevich authored
See https://groups.google.com/d/msg/android-ndk/BbEOA9pnR-I/HgLkGy5qAgAJ Addresses the following denial: avc: denied { lock } for path="/data/data/com.mypackage/files/somefilename" dev="mmcblk0p28" ino=114736 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 While I'm here, also add lock to w_file_perms. Change-Id: I2568a228099c4e112e4a8b80da3bfcf2e35eb0ea
-
Vladislav Kuzkokov authored
-
Vladislav Kuzkokov authored
Access to modifying methods of ProxyService is checked in implementation. Bug: 27337770 Change-Id: I718ea8f4fd6be940ee9ef57f0571d884a013489b
-
Daniel Rosenberg authored
-
- Mar 19, 2016
-
-
Felipe Leme authored
Cherry picked from 610f461e (AOSP). BUG: 27419521 Change-Id: I63108468d75be3ef7f9761107a3df8997f207d07
-
- Mar 16, 2016
-
-
Nick Kralevich authored
The changes to ptrace in https://android-review.googlesource.com/#/c/175786/ (removing it from app.te and only adding it to isolated_app and untrusted_app) broke WebView crash handling in cases where privileged apps (like gmscore) use WebView. The only way to fix this would be to allow priv_app to self-ptrace as well. :/ Bug: 27697529 Change-Id: Ib9a3810dddc9f4213b6260133cbae23f669ae8dc
-
- Mar 15, 2016
-
-
Peng Xu authored
SELinux label is created for contexthub_service system service. ContextHub service manages all available context hubs and serves fulfil communication between apps and underlying context hub hardware. Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
-
- Mar 14, 2016
-
-
dcashman authored
Applications do not explicitly request handles to the batteryproperties service, but the BatteryManager obtains a reference to it and uses it for its underlying property queries. Mark it as an app_api_service so that all applications may use this API. Also remove the batterypropreg service label, as this does not appear to be used and may have been a duplication of batteryproperties. As a result, remove the healthd_service type and replace it with a more specific batteryproperties_service type. (cherry-picked from commit: 9ed71eff) Bug: 27442760 Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
-
Polina Bondarenko authored
-
Daniel Cashman authored
-
- Mar 11, 2016
-
-
dcashman authored
HwRngTest needs access to the hwrandom sysfs files, but untrused_app does not have access to sysfs. Give these files their own label and allow the needed read access. Bug: 27263241 Change-Id: I718ba485e9e6627bac6e579f746658d85134b24b
-
- Mar 10, 2016
-
-
Daniel Cashman authored
-
Josh Gao authored
-
Nick Kralevich authored
Remove permissions which are already covered by other permissions. Found by running: sepolicy-analyze path/to/sepolicy dups No functional change. Change-Id: I526d1c1111df718b29e8276b024fa0788ad17c71
-
dcashman authored
Many permissions were removed from untrusted_app by the removal of domain_deprecated, including procfs access. procfs file access was restored, however, but not completely. Add the ability to getattr to all domains, so that other domains which lost domain_deprecated may benefit, as they will likely need it. Bug: 27249037 Change-Id: Id3f5e6121548b29d739d5e0fa6ccdbc9f0fc29be
-
Josh Gao authored
Bug: http://b/27367422 Change-Id: I936c16281e06214b35f8d245da8f619dc92ff15f (cherry picked from commit 48141c36)
-
Oleksandr Peletskyi authored
BUG: 27583869 Change-Id: I0a25bd03f3998d48dba355b91140611e38ce7b0d
-
- Mar 09, 2016
-
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for service=media.drm pid=6030 uid=10012 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:mediadrmserver_service:s0 tclass=service_manager Bug: 27553530 Change-Id: I060de7ee1f66c7a545076b7de8363bebaac61f2c
-
Makoto Onuki authored
-
Polina Bondarenko authored
Bug: 27531271 Change-Id: I3c5eee86d09696373ab155f93ba6c85da224cb51
-
Torne (Richard Coles) authored
It's okay for isolated apps to connect to the webview update service to find out which APK is WebView. This enables isolated renderer processes to load their code from the WebView APK. Change-Id: Ia287280a994dbd852b4f630da5548e7b6cf4e08f
-
Makoto Onuki authored
... and client apps to read them. A full path looks like this: /data/system_ce/[user-id]/shortcut_service/bitmaps/[creator-app-package]/[timestamp].png System server will: - Create/delete the directories. - Write/remove PNG files in them. - Open the PNG files and return file descriptors to client apps Client apps will: - Receive file descriptors and read from them. Bug 27548047 Change-Id: I3d9ac6ab0c92b2953b84c3c5aabe1f653e6bea6b
-
- Mar 08, 2016
-
-
Calin Juravle authored
-
- Mar 07, 2016
-
-
Calin Juravle authored
Vold needs to be able to query if the directory exists and eventually to fix permissions and the owner. Typical error: W vold : type=1400 audit(0.0:485): avc: denied { getattr } for path="/data/misc/profiles/cur/11/foreign-dex" dev="dm-2" ino=343857 scontext=u:r:vold:s0 tcontext=u:object_r:user_profile_foreign_dex_data_file:s0 tclass=dir permissive=0 Bug: 27517932 Change-Id: Iff10c864634baa97cc814916ee7495b262e0c7eb
-
Makoto Onuki authored
-
dcashman authored
Bug: 27511071 Change-Id: I99ea21638a4df8ad1f815d91bb970e1f8f143030
-
Ruben Brunk authored
-
Ruben Brunk authored
- Required to query cpusets information. Bug: 22855417 Bug: 27381794 Bug: 27498731 Change-Id: I6d192aad2135d99a6c9cdaf97696b0822bd21897
-
Daniel Rosenberg authored
Change-Id: I4c318efba76e61b6ab0be9491c352f281b1c2bff Bug: 19160983
-
Nick Kralevich authored
Bug: 27511071 Change-Id: I737aa9daac6c78846fe375300c3338e401d733ac
-
Nick Kralevich authored
It's unlikely we'll get /proc locked down for the N release, so delete the auditallow to avoid spamming the logs. Mark this commit as DO NOT MERGE so we can continue to make progress on this for future Android releases. Change-Id: Ibf27bc5cb1b23c21e123aae8a4f190560d0ac2dc
-