- Sep 10, 2013
-
-
Alex Klyubin authored
Apps attempting to write to /dev/random or /dev/urandom currently succeed, but a policy violation is logged. These two Linux RNG devices are meant to be written to by arbitrary apps. Thus, there's no reason to deny this capability. Bug: 10679705 Change-Id: Ife401f1dd2182889471eef7e90fcc92e96f9c4d6
-
Alex Klyubin authored
This enables installd to uninstall or clear data of installed apps whose data directory contains unusual file types, such as FIFO. Bug: 10680357 (cherry picked from commit 839af9ed) Change-Id: I5715f7d6d3214896ad0456d614b052cf5fb79eef
-
- Sep 06, 2013
-
-
William Roberts authored
This breaks the ability for users to have certs in many directories. Currently the design is to allow keys.conf to specify arbitrary locations for pem files, relative to the root of the Android tree. If users want to have a common prefix on all the keys, then they can export DEFAULT_SYSTEM_DEV_CERTIFICATE, and make that an environment variable in their keys.conf file. Signed-off-by:
William Roberts <wroberts@tresys.com> Change-Id: I23455b891206cab6eca7db08ff3c28283f87c640 Signed-off-by:
William Roberts <wroberts@tresys.com>
-
- Sep 05, 2013
-
-
Geremy Condra authored
-
Geremy Condra authored
For additional context- The denials related to init_tmpfs are of the form: denied { read } for pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file (the path above is "/dev/ashmem/dalvik-heap (deleted)") The denials related to executing things from the dalvik cache are of the form: enied { execute } for pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file The denials related to isolated_app and the init socket are: denied { getattr } for pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket The getopt denials for the aforementioned socket are: denied { getopt } for pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
-
- Sep 04, 2013
-
-
Geremy Condra authored
-
Nick Kralevich authored
At this point, we still don't understand the root cause of bug 10290009, or if it's even a real bug. Rollback 29d0d406 so we an get a device in this state and figure out the root cause of this problem. This reverts commit 29d0d406. Bug: 10290009
-
Geremy Condra authored
Change-Id: Ie0947f79c63f962220d3c9316c5d5d82f677821f
-
- Aug 30, 2013
-
-
Geremy Condra authored
This fixes another bug encountered while taking bugreports. Bug: 10498304 Change-Id: Ie33e869ccd28c5461f4f3736c078b2a865aa7cdd
-
Geremy Condra authored
Bug: 10498304 Change-Id: I312665a2cd09fa16ae3f3978aebdb0da99cf1f74
-
- Aug 29, 2013
-
-
dcashman authored
-
- Aug 28, 2013
-
-
Geremy Condra authored
* commit 'cec3c1e4': Add capabilities to Zygote to fix valgrind.
-
Geremy Condra authored
* commit 'e0362602': Add capabilities to Zygote to fix valgrind.
-
dcashman authored
Change-Id: I898bb4ee8fdb95b48e58c98bffdb381b03c719bb
-
Geremy Condra authored
Bug: 10455872 Change-Id: I98885e8cd1e4f9ab0d3e2af6d79b078a000db539
-
- Aug 23, 2013
-
-
Geremy Condra authored
-
Geremy Condra authored
This is based on Joshua Brindle's sepolicy-inject. Change-Id: Ie75bd56a2996481592dcfe7ad302b52f381d5b18
-
- Aug 20, 2013
-
-
Richard Haines authored
* commit '81cdd6c6': Fix insertkeys.py to resolve keys.conf path entries in a portable way
-
Richard Haines authored
* commit '1b46b2fe': Fix insertkeys.py to resolve keys.conf path entries in a portable way
-
- Aug 17, 2013
-
-
Geremy Condra authored
* commit '553bafef': Add the ability to write shell files to the untrusted_app domain.
-
Geremy Condra authored
* commit '29d0d406': Add the ability to write shell files to the untrusted_app domain.
-
- Aug 16, 2013
-
-
Geremy Condra authored
Bug: 10290009 Change-Id: Ic794299261672b36a2b630893b65ab176c3eee6b (cherry picked from commit eaa4e844e4c8549c9b4808a1272876a6995ca5a7)
-
- Aug 14, 2013
-
-
The Android Open Source Project authored
* commit 'b74efd33': Move isolated_app.te / untrusted_app.te into permissive Grant fsetid Linux capability to vold. Add "shell" to seapp_contexts
-
The Android Open Source Project authored
Change-Id: If9a2d360a37a8641a70fb475c7f5422d0cf8b900
-
- Aug 08, 2013
-
-
Richard Haines authored
Currently a path to a key in keys.conf must be fully qualified or have the -d option appended. This fix will allow paths to have environment variables that will be expanded. This will give portability to the entries. For example the following entry will now be resolved correctly: [@NET_APPS] ALL : $ANDROID_BUILD_TOP/device/demo_vendor/demo_dev/security/net_apps.x509.pem Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead Signed-off-by:
Richard Haines <richard_c_haines@btinternet.com>
-
- Aug 06, 2013
-
-
The Android Automerger authored
-
- Aug 05, 2013
-
-
Lorenzo Colitti authored
Bug: 10175701 Change-Id: I185df22bdbaafd56725760ec6c71340b67455046
-
- Jul 30, 2013
-
-
The Android Automerger authored
-
- Jul 26, 2013
-
-
Todd Poynor authored
-
- Jul 17, 2013
-
-
The Android Automerger authored
-
- Jul 16, 2013
-
-
Alex Klyubin authored
Change-Id: Ided2cf793e94bb58529789c3075f8480c0d0cf4e
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
Bug: 9872463 Change-Id: I47eabeace3387afd24c0fd4bee70e77c0a3586d5
-
The Android Automerger authored
-
Nick Kralevich authored
Bug: 9859477 Change-Id: Iadd26cac2f318b81701310788bed795dadfa5b6b
-
- Jul 15, 2013
-
-
Nick Kralevich authored
This is needed to support "Verify App" functionality. During side loading, the Verify App functionality reads the APK to determine if it's safe to install. Bug: 9863154 Change-Id: I33f6b0fd012f6cb194e253d5d92cf6189d6aa222
-
Nick Kralevich authored
-
Nick Kralevich authored
/sys was getting labeled as a rootfs file, but according to genfs_contexts, it's really a sysfs file. This conflict is causing problems when patch f29c533c49ab1c90eae612b1c454f2c6879a6658 from system/core is applied. Change-Id: I3f34c9ee68bedb171ebebfcd356e924c987b58ff
-
Nick Kralevich authored
-