- Mar 02, 2016
-
-
Lorenzo Colitti authored
This reverts commit b5594c27. Bug: 27239233 Change-Id: I407a2f3a313f3de801080f9bae46f6bac1a803c2
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
This reverts commit 54457959. Change-Id: Idfa0254e66f9517cc26af3c37441b47cbb984bca
-
Jeff Sharkey authored
avc: denied { write } for path="/data/system_de/0/ringtones/ringtone_cache" dev="mmcblk0p44" ino=1602501 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0 Bug: 27366059 Change-Id: I120a69ac4f58c64db6f169ae4f9942ce357b0b1f
-
- Mar 01, 2016
-
-
Calin Juravle authored
This is a special profile folder where apps will leave profile markers for the dex files they load and don't own. System server will read the markers and decide which apk should be fully compiled instead of profile guide compiled. Apps need only to be able to create (touch) files in this directory. System server needs only to be able to check wheter or not a file with a given name exists. Bug: 27334750 Bug: 26080105 Change-Id: I2256e4aba1ec0e5117de6497123223b9a74f404e
-
- Feb 29, 2016
-
-
Nick Kralevich authored
Bluetooth uses the tun device for tethering. Allow access. STEPS TO REPRODUCE: 0. Have two devices to test on, say Device A and Device B 1. On Device A, Go to settings ->Bluetooth . 2. Turn on the Bluetooth . 3. Pair it with device B 4. Tap on the paired device OBSERVED RESULTS: -Bluetooth share crash is observed with "Bluetooth share has stopped" error message -Unable to use Bluetooth tethering due to this issue EXPECTED RESULTS: No crash and Bluetooth devices should be able to connect for tethering Addresses the following denial: com.android.bluetooth: type=1400 audit(0.0:131): avc: denied { open } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=12340 scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0 Bug: 27372573 (cherry picked from commit 9a1347ee) Change-Id: Ibd16e48c09fe80ebb4f3779214de3b4806c12497
-
- Feb 28, 2016
-
-
Marco Nelissen authored
-
Marco Nelissen authored
avc: denied { find } for service=SurfaceFlinger scontext=u:r:mediacodec:s0 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager Bug: 26990688 Change-Id: Ie7c5f6d879c286375eb52ef4c6b84726aa4f1ba2
-
- Feb 27, 2016
-
-
Nick Kralevich authored
It's a CTS requirement that all SELinux domains be in enforcing mode. Add the same assertion to the build system when targeting user builds. In particular, this avoids a situation where device integrity checking is enabled on user builds, but permissive denials are being generated, causing the device to unexpectedly reboot into safe mode. A developer wanting to put an SELinux domain into permissive mode for userdebug/eng purposes can write the following in their policy: userdebug_or_eng(` permissive foo; ') Bug: 26902605 Bug: 27313768 (cherry picked from commit bca98efa) Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
-
Jeff Tinker authored
-
Jeff Tinker authored
bug: 26782004 Change-Id: Ie3d9289d15446efa160550185a2d565e3be2980f
-
- Feb 26, 2016
-
-
Jeff Vander Stoep authored
Bug: 26982110 Change-Id: I551f8cc926886de0feaf065da46d3cf5bdf5cfb5
-
- Feb 25, 2016
-
-
Jeffrey Vander Stoep authored
-
- Feb 24, 2016
-
-
Marco Nelissen authored
-
Marco Nelissen authored
Bug: 27305063 Change-Id: Ie9ac3fb971dbb989d7b26421e076139d3f48a916
-
Jeff Vander Stoep authored
neverallow access to other domains. Bug: 27239233 Change-Id: I503d1be7308d0229db1cbe52cd511f7f40afa987
-
Glenn Kasten authored
-
Jeffrey Vander Stoep authored
-
Daniel Cashman authored
-
Lorenzo Colitti authored
-
dcashman authored
Address the following denial: m.chrome.canary: type=1400 audit(0.0:15): avc: granted { read open } for path="/proc/meminfo" dev="proc" ino=4026544360 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file Bug: 22032619 Chromium Bug: 586021 Change-Id: I584345c84d870c313da69ec97a0b1e54c0eb9ee1
-
Glenn Kasten authored
Bug: 27323882 Change-Id: Idf3977d74817c4f90f9e993d2e1e5302cc56f41d
-
- Feb 23, 2016
-
-
Jeff Vander Stoep authored
Remove all permissions not observed during testing. Remove domain_deprecated Bug: 27064332 Change-Id: Ie154af70aaf255721b46d29357e48d5337020b4b
-
Yabin Cui authored
-
Jeff Sharkey authored
-
Jeff Sharkey authored
Ringtones often live on shared media, which is now encrypted with CE keys and not available until after the user is unlocked. To improve the user experience while locked, cache the default ringtone, notification sound, and alarm sound in a DE storage area. Also fix bug where wallpaper_file wasn't getting data_file_type. Bug: 26730753 Change-Id: Ib1f08d03eb734c3dce91daab41601d3ed14f4f0d
-
Daniel Sandler authored
-
Dan Sandler authored
Bug: 26804329 Change-Id: I7b789c6fe8411e3a4a718da86d442a0f48c5c310
-
Lorenzo Colitti authored
Bug: 27239233 Change-Id: Icc9d14008d2ff6334a8ec66805f7289aedd5d97d
-
Lorenzo Colitti authored
-
Erik Kline authored
-
- Feb 22, 2016
-
-
Sami Tolvanen authored
Bug: 26902605 Change-Id: Ica825cf2af74f5624cf4091544bd24bb5482dbe7 (cherry picked from commit 9c168711)
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Remove from unpriv_socket_ioctls but grant each user of unpriv_socket_ioctls use of unpriv_tty_ioctls Bug: 26990688 Change-Id: I998e09091de5a7234ad0049758d5dad0b35722f7
-
Tao Bao authored
-
Tao Bao authored
RecoverySystemService is separated from PowerManagerService as a dedicated system service to handle recovery related requests (such as invoking uncrypt to uncrypt an OTA package on /data or to set up / clear the bootloader control block (i.e. /misc) and etc). The matching CL in frameworks/base is in: Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560. Bug: 26830925 Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e (cherry picked from commit 65b5fde9)
-
Calin Juravle authored
-
Polina Bondarenko authored
-
Erik Kline authored
Requires net_raw and net_bind_service. Bug: 26991160 Change-Id: I4cdd23f0d0c94c9b5126c821464aadc67cdb90c9
-