Skip to content
Snippets Groups Projects
  1. Mar 10, 2016
    • dcashman's avatar
      Allow domains to getattr proc lnk_file. · 74ae21b3
      dcashman authored
      Many permissions were removed from untrusted_app by the removal of
      domain_deprecated, including procfs access. procfs file access was restored,
      however, but not completely.  Add the ability to getattr to all domains,
      so that other domains which lost domain_deprecated may benefit, as they
      will likely need it.
      
      Bug: 27249037
      Change-Id: Id3f5e6121548b29d739d5e0fa6ccdbc9f0fc29be
      74ae21b3
  2. Mar 09, 2016
  3. Mar 08, 2016
  4. Mar 07, 2016
  5. Mar 06, 2016
  6. Mar 05, 2016
    • Jeff Sharkey's avatar
      Cached ringtone files should be mlstrustedobject. · 2f829dcd
      Jeff Sharkey authored
      Both appdomain and priv_app can set the default ringtones, so the
      cache files need to be mlstrustedobject.
      
      avc: denied { write } for path="/data/system_de/0/ringtones/ringtone_cache" dev="mmcblk0p44" ino=1602501 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0
      
      Bug: 27366059
      Change-Id: Ib362f58b180a62bd46800083d6c538426f955b10
      2f829dcd
  7. Mar 04, 2016
    • Alex Deymo's avatar
      New postinstall domain and rules to run post-install program. · a52b5618
      Alex Deymo authored
      When using the A/B updater, a device specific hook is sometimes needed
      to run after the new partitions are updated but before rebooting into
      the new image. This hook is referred to throughout the code as the
      "postinstall" step.
      
      This patch creates a new execution domain "postinstall" which
      update_engine will use to run said hook. Since the hook needs to run
      from the new image (namelly, slot "B"), update_engine needs to
      temporarly mount this B partition into /postinstall and then run a
      program from there.
      
      Since the new program in B runs from the old execution context in A, we
      can't rely on the labels set in the xattr in the new filesystem to
      enforce the policies baked into the old running image. Instead, when
      temporarily mounting the new filesystem in update_engine, we override
      all the new file attributes with the new postinstall_file type by
      passing "context=u:object_r:postinstall_file:s0" to the mount syscall.
      This allows us to set new rules specific to the postinstall environment
      that are consistent with the rules in the old system.
      
      Bug: 27177071
      TEST=Deployed a payload with a trivial postinstall script to edison-eng.
      
      (cherry picked from commit 6cb2c893)
      
      Change-Id: I49a529eecf1ef0524819470876ef7c8c2659c7ef
      a52b5618
  8. Mar 03, 2016
  9. Mar 02, 2016
  10. Mar 01, 2016
    • Makoto Onuki's avatar
      Add new system service "shortcut". · 7508224f
      Makoto Onuki authored
      Bug 27325877
      
      Change-Id: Idf2f9ae816e1f3d822a6286a4cf738c14e29a45e
      7508224f
    • Calin Juravle's avatar
      Add SElinux policies to allow foreign dex usage tracking. · 837bc42f
      Calin Juravle authored
      This is a special profile folder where apps will leave profile markers
      for the dex files they load and don't own. System server will read the
      markers and decide which apk should be fully compiled instead of
      profile guide compiled.
      
      Apps need only to be able to create (touch) files in this directory.
      System server needs only to be able to check wheter or not a file with a
      given name exists.
      
      Bug: 27334750
      Bug: 26080105
      
      Change-Id: I2256e4aba1ec0e5117de6497123223b9a74f404e
      837bc42f
  11. Feb 29, 2016
    • Nick Kralevich's avatar
      Allow bluetooth access to the tun device. · ba12da95
      Nick Kralevich authored
      Bluetooth uses the tun device for tethering. Allow access.
      
        STEPS TO REPRODUCE:
        0. Have two devices to test on, say Device A and Device B
        1. On Device A, Go to settings ->Bluetooth .
        2. Turn on the Bluetooth .
        3. Pair it with device B
        4. Tap on the paired device
      
        OBSERVED RESULTS:
        -Bluetooth share crash is observed with "Bluetooth share has stopped"
        error message
        -Unable to use Bluetooth tethering due to this issue
      
        EXPECTED RESULTS:
        No crash and Bluetooth devices should be able to connect for tethering
      
      Addresses the following denial:
      
      com.android.bluetooth: type=1400 audit(0.0:131): avc: denied { open }
      for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs"
      ino=12340 scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0
      tclass=chr_file permissive=0
      
      Bug: 27372573
      
      (cherry picked from commit 9a1347ee)
      
      Change-Id: Ibd16e48c09fe80ebb4f3779214de3b4806c12497
      ba12da95
  12. Feb 28, 2016
  13. Feb 27, 2016
    • Nick Kralevich's avatar
      Don't allow permissive SELinux domains on user builds. · 3df1fda5
      Nick Kralevich authored
      It's a CTS requirement that all SELinux domains be in
      enforcing mode. Add the same assertion to the build system
      when targeting user builds.
      
      In particular, this avoids a situation where device integrity
      checking is enabled on user builds, but permissive denials
      are being generated, causing the device to unexpectedly reboot
      into safe mode.
      
      A developer wanting to put an SELinux domain into permissive
      mode for userdebug/eng purposes can write the following
      in their policy:
      
        userdebug_or_eng(`
          permissive foo;
        ')
      
      Bug: 26902605
      Bug: 27313768
      
      (cherry picked from commit bca98efa)
      
      Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
      3df1fda5
    • Jeff Tinker's avatar
    • Jeff Tinker's avatar
      Allow mediadrmserver to access media files · 05aa151c
      Jeff Tinker authored
      bug: 26782004
      Change-Id: Ie3d9289d15446efa160550185a2d565e3be2980f
      05aa151c
    • Fyodor Kupolov's avatar
      Add NetworkTimeUpdateService · 3d564e52
      Fyodor Kupolov authored
      NetworkTimeUpdateService has been registered as a system service, so that
      its dump state can be included into bugreports.
      
      Bug: 23983739
      Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
      3d564e52
  14. Feb 26, 2016
Loading