Skip to content
Snippets Groups Projects
  1. Jun 08, 2017
  2. Jun 06, 2017
  3. Jun 05, 2017
  4. Jun 03, 2017
  5. Jun 02, 2017
  6. Jun 01, 2017
  7. May 31, 2017
    • Narayan Kamath's avatar
      SEPolicy: Allow app / system_server to write to dumpstate pipes. · 32c7000e
      Narayan Kamath authored
      am: a34781ae
      
      Change-Id: Ic4103ff418e69f000198bb588f0cfccc578ba324
      32c7000e
    • Narayan Kamath's avatar
      SEPolicy: Allow app / system_server to write to dumpstate pipes. · a34781ae
      Narayan Kamath authored
      tombstoned allows dumpstate to install "intercepts" to java trace
      requests for a given process. When an "intercept" is installed, all
      trace output is redirected to a pipe provided by dumpstate instead
      of the default location (usually in /data/anr or /data/tombstone).
      
      Note that these processes are already granted "write" and "getattr"
      on dumpstate:fifo_file in order to communicate with dumpstate; this
      change adds "append" to the existing set of permissions.
      
      Bug: 32064548
      Test: manual
      Change-Id: Iccbd78c59071252fef318589f3e55ece51a3c64c
      a34781ae
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · 5e8fe834
      Narayan Kamath authored
      am: e628cb5b
      
      Change-Id: If2ce6fbf2b897d58da78430a7bae0fd6fb6e5a49
      5e8fe834
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · e628cb5b
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
      Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
      e628cb5b
  8. May 27, 2017
  9. May 26, 2017
  10. May 25, 2017
  11. May 24, 2017
  12. May 22, 2017
  13. May 18, 2017
  14. May 15, 2017
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · 1a6fabea
      Alex Vakulenko authored
      am: c4055f0d
      
      Change-Id: I4f307d49476c1e84d8dd17d02f383d7c10a959fc
      1a6fabea
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · c4055f0d
      Alex Vakulenko authored
      Specify per-service rules for PDX transport. Now being able to
      grant permissions to individual services provided by processes,
      not all services of a process.
      
      Also tighter control over which permissions are required for
      client and server for individual components of IPC (endpoints,
      channels, etc).
      
      Bug: 37646189
      Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      Merged-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      c4055f0d
  15. May 12, 2017
  16. May 11, 2017
  17. May 10, 2017
    • Tao Bao's avatar
      recovery.te: Allow setting sys.usb.ffs.ready. · ce5ca4d0
      Tao Bao authored
      This is needed for devices using configfs, where init listens for
      sys.usb.ffs.ready=1 to config usb_gadget. When recovery starts
      sideloading, minadbd (forked from recovery) sets the property to trigger
      that action.
      
      avc:  denied  { set } for property=sys.usb.ffs.ready pid=541 uid=0 gid=0
      scontext=u:r:recovery:s0 tcontext=u:object_r:ffs_prop:s0
      tclass=property_service
      
      Bug: 35803743
      Test: Device shows up in sideload mode.
      Change-Id: Ie7f1224d3a8650160ac29811f73b8286fbced4f4
      ce5ca4d0
Loading