- Jul 15, 2014
- Jul 14, 2014
-
-
Nick Kralevich authored
Force any experimental SELinux domains (ones tagged with "permissive_or_unconfined") into unconfined. This flag is intended to be flipped when we're preparing a release, to eliminate inconsistencies between user and userdebug devices, and to ensure that we're enforcing a minimal set of rules for all SELinux domains. Without this change, our user builds will behave differently than userdebug builds, complicating testing. Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
-
- Jul 11, 2014
-
-
Sreeram Ramachandran authored
* commit '2f91ce55':
-
Nick Kralevich authored
* commit '1c7463ac':
-
Nick Kralevich authored
* commit 'ddfaf822':
-
Jeff Sharkey authored
* commit '554a8a3d':
-
Sreeram Ramachandran authored
* commit 'e4409728': Allow netd to create data files in /data/misc/net/.
-
Nick Kralevich authored
* commit 'd27aeb21': recovery: allow read access to fuse filesystem
-
Nick Kralevich authored
* commit 'd86b0a81': New domain "install_recovery"
-
Jeff Sharkey authored
* commit 'e900e573': Rules to allow installing package directories.
-
- Jul 10, 2014
-
-
Doug Zongker authored
Support opening the ffs-based interface for adbd in recovery. (Copied from adbd.te.) Bug: 16183878 Change-Id: I714ccb34f60d1413d2b184dae9b561cd06bc6b45
-
Nick Kralevich authored
* commit 'a2933b66': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '2b3c5de2': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '5b347a60': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
* commit '1d2ff869': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
ueventd is allowed to change files and directories in /sys, but not symbolic links. This is, at a minimum, causing the following denial: type=1400 audit(0.0:5): avc: denied { getattr } for comm="ueventd" path="/sys/devices/tegradc.0/driver" dev=sysfs ino=3386 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_tegradc:s0 tclass=lnk_file Allow ueventd to modify labeling / attributes of symlinks. Change-Id: If641a218e07ef479d1283f3171b2743f3956386d
-
Nick Kralevich authored
* commit '5b5ba50f': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
* commit 'b59dc27a': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
The new Nexus 5 tee implementation requires raw block I/O for anti-rollback protection. Bug: 15777869 Change-Id: I57691a9d06b5a51e2699c240783ed56e3a003396
-
Nick Kralevich authored
* commit '7e953e77': Don't use don't
-
Nick Kralevich authored
* commit 'f5835666': Don't use don't
-
Nick Kralevich authored
* commit 'f7cf7a4b': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
* commit '99d86c7a': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
Single quotes sometimes mess up m4 parsing Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
-
Nick Kralevich authored
Bug: 10243159 Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
-
Colin Cross authored
* commit 'bfd4eac7': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit 'aaaeb02e': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit '568443bc': Let DCS read staged APK clusters.
-
Colin Cross authored
* commit '5d60f04e': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit '2cd9c9bd': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit 'd3356826': Let DCS read staged APK clusters.
-
Colin Cross authored
Bug: 15313911 Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
-
- Jul 09, 2014
-
-
Jeff Sharkey authored
DCS is DefaultContainerService. avc: denied { getattr } for path="/data/app/vmdl2.tmp" dev="mmcblk0p28" ino=162910 scontext=u:r:platform_app:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir Bug: 14975160 Change-Id: Ifca9afb4e74ebbfbeb8c01e1e9ea65f5b55e9375
-
Andres Morales authored
* commit '9c52a78c': Allow SystemServer to start PersistentDataBlockService
-
Andres Morales authored
* commit 'e844113b': Allow SystemServer to start PersistentDataBlockService
-
Nick Kralevich authored
-
Nick Kralevich authored
Start enforcing SELinux rules for install_recovery. Change-Id: I052c7d2203babf3e146cf32794283e80ca21dd9a
-
Andres Morales authored
-
Andres Morales authored
Defines new device type persistent_data_block_device This block device will allow storage of data that will live across factory resets. Gives rw and search access to SystemServer. Change-Id: I298eb40f9a04c16e90dcc1ad32d240ca84df3b1e
-