Skip to content
Snippets Groups Projects
  1. Sep 10, 2013
    • Alex Klyubin's avatar
      Permit writing to /dev/random and /dev/urandom. · a2477056
      Alex Klyubin authored
      Apps attempting to write to /dev/random or /dev/urandom currently
      succeed, but a policy violation is logged. These two Linux RNG
      devices are meant to be written to by arbitrary apps. Thus, there's
      no reason to deny this capability.
      
      Bug: 10679705
      
      Change-Id: Ife401f1dd2182889471eef7e90fcc92e96f9c4d6
      a2477056
    • Alex Klyubin's avatar
      Permit installd to unlink all types of data_file_type. · 34a8e121
      Alex Klyubin authored
      This enables installd to uninstall or clear data of installed apps
      whose data directory contains unusual file types, such as FIFO.
      
      Bug: 10680357
      
      (cherry picked from commit 839af9ed)
      
      Change-Id: I5715f7d6d3214896ad0456d614b052cf5fb79eef
      34a8e121
  2. Sep 06, 2013
  3. Sep 05, 2013
    • Geremy Condra's avatar
      Merge "Fix more long-tail denials." · 21d13e9b
      Geremy Condra authored
      21d13e9b
    • Geremy Condra's avatar
      Fix more long-tail denials. · 217f8afc
      Geremy Condra authored
      For additional context-
      
      The denials related to init_tmpfs are of the form:
      
      denied  { read } for  pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file
      
      (the path above is "/dev/ashmem/dalvik-heap (deleted)")
      
      The denials related to executing things from the dalvik cache are of the form:
      
      enied  { execute } for  pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file
      
      The denials related to isolated_app and the init socket are:
      
      denied  { getattr } for  pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      The getopt denials for the aforementioned socket are:
      
      denied  { getopt } for  pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
      217f8afc
  4. Sep 04, 2013
  5. Aug 30, 2013
  6. Aug 29, 2013
  7. Aug 28, 2013
  8. Aug 23, 2013
  9. Aug 20, 2013
  10. Aug 17, 2013
  11. Aug 16, 2013
  12. Aug 14, 2013
  13. Aug 08, 2013
  14. Aug 06, 2013
  15. Aug 05, 2013
  16. Jul 30, 2013
  17. Jul 26, 2013
  18. Jul 17, 2013
  19. Jul 16, 2013
  20. Jul 15, 2013
Loading