Skip to content
Snippets Groups Projects
  1. Sep 13, 2016
  2. Sep 12, 2016
    • Narayan Kamath's avatar
      Allow the zygote to stat all files it opens. · 221938cb
      Narayan Kamath authored
      (cherry picked from commit 63203a01)
      
      bug: 30963384
      Change-Id: I62b5ffd43469dbb0bba67e1bb1d3416e7354f9e5
      221938cb
    • Amith Yamasani's avatar
      Allow apps to read preloaded photos · aa2a33a2
      Amith Yamasani authored
      (cherry picked from commit e01654f9)
      
      For Retail Demo mode, we need to preload photos in
      /data/preloads and allow regular apps to access the
      photos returned by the media provider from the preloads
      directory.
      
      Bug: 29940807
      Change-Id: Ic1061dac55ace1b125ae04b5b0c70aae9aa0c732
      aa2a33a2
    • Andreas Gampe's avatar
      Sepolicy: Adapt for new A/B OTA flow · 03daf853
      Andreas Gampe authored
      (cherry picked from commit d47c1e93)
      
      To include target slot names in the naming of A/B OTA artifacts,
      and new path has been implemented. Instead of passing through
      the system server and forking off of installd, otapreopt_chroot
      is now driven directly from the otapreopt script.
      
      Change the selinux policy accordingly: allow a transition from
      postinstall to otapreopt_chroot, and let otapreopt_chroot inherit
      the file descriptors that update_engine had opened (it will close
      them immediately, do not give rights to the downstream executables
      otapreopt and dex2oat).
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: I6b476183572c85e75eda4d52f60e4eb5d8f48dbb
      03daf853
    • David Brazdil's avatar
      dumpstate: Change SELinux policy to allow reading /data/misc/profiles · aa6308fc
      David Brazdil authored
      (cherry picked from commit cf63957d)
      
      This is needed in order to include profile files in bugreports.
      
      Bug: 28610953
      Change-Id: I025189a4ac66b936711fdb4e20b10c2b0a7427d1
      aa6308fc
    • Jeff Vander Stoep's avatar
      drmserver: read locked ringtones · 188f9b14
      Jeff Vander Stoep authored
      (cherry picked from commit f23b870a)
      
      avc: denied { read } for comm="generic" path="/data/system_de/0/ringtones/ringtone_cache" dev="sda35" ino=1114120 scontext=u:r:drmserver:s0 tcontext=u:object_r:ringtone_file:s0 tclass=file
      
      Change-Id: I40992733d779743be92c15a094d166a3df64a10f
      Fixes: 30167454
      188f9b14
    • Alex Light's avatar
      Allow cppreopts to work with selinux · b7ebb32f
      Alex Light authored
      (cherry picked from commit d3edd6b5)
      
      Bug: 29278988
      Change-Id: I199572377a6b5c33116c718a545159ddcf50df30
      b7ebb32f
    • Geoffrey Pitsch's avatar
      Allow audioserver for bootanim. · 54061dd1
      Geoffrey Pitsch authored
      (cherry picked from commit ad5b4be3)
      
      Required for using native audio in BootAnimation
      
      Bug: 29055299
      Change-Id: Ie75d35219be95a8dc697cc3c0384a4de90ea3478
      54061dd1
    • Jeffrey Vander Stoep's avatar
      Merge changes from topic 'blacklist_app_data_execute' · 72a2d64d
      Jeffrey Vander Stoep authored
      * changes:
        fix build: exclude bluetooth from neverallow restriction
        Remove platform_app from neverallow execute from /data
        Rework neverallow for /data execute permission
      72a2d64d
    • Christopher Wiley's avatar
      Add back fowner capability to netd · 28029706
      Christopher Wiley authored
      This addresses error messages like:
      
      11-30 18:00:15.196  6917  6917 W Binder:6596_2: type=1400 audit(0.0:46):
      avc: denied { fowner } for capability=3 scontext=u:r:netd:s0
      tcontext=u:r:netd:s0 tclass=capability permissive=0
      
      11-30 18:00:15.200  6596  6917 E /system/bin/netd:
      android::WriteStringToFile fchmod failed: Operation not permitted
      
      11-30 18:00:15.200  6596  6917 E Netd    : failed to write to
      /data/misc/net/rt_tables (Operation not permitted)
      
      Bug: 31147892
      Change-Id: Id11704f8e2b8c08db92de374ed44913b70d6ae66
      28029706
    • Nick Kralevich's avatar
      fix build: exclude bluetooth from neverallow restriction · e1b00f39
      Nick Kralevich authored
      Bluetooth is sometimes started from init.
      
      Addresses the following compiler error:
      
        libsepol.report_failure: neverallow on line 489 of
        system/sepolicy/domain.te (or line 9149 of policy.conf) violated by
        allow init bluetooth:process { transition };
        libsepol.check_assertions: 1 neverallow failures occurred
        Error while expanding policy
      
      (cherry-picked from commit 7e380216)
      
      Change-Id: I2bc1e15217892e1ba2a62c9683af0f3c0aa16b86
      e1b00f39
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · c255e377
      Nick Kralevich authored
      Apparently some manufacturers sign APKs with the platform key
      which use renderscript. Renderscript works by compiling the
      .so file, and placing it in the app's home directory, where the
      app loads the content.
      
      Drop platform_app from the neverallow restriction to allow partners
      to add rules allowing /data execute for this class of apps.
      
      We should revisit this in the future after we have a better
      solution for apps which use renderscript.
      
      (cherry picked from commit c55cf17a)
      
      Bug: 29857189
      Change-Id: I058a802ad5eb2a67e657b6d759a3ef4e21cbb8cc
      c255e377
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · 6bb6c16e
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      
      (cherry picked from commit c5266df9)
      
      Change-Id: I4adb58e8c8b35122d6295db58cedaa355cdd3924
      6bb6c16e
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      slideshow: remove domain_deprecated attribute · fb873176
      Jeff Vander Stoep authored
      No "granted" messages for the removed permissions observed in three
      months of log audits.
      
      Bug: 28760354
      Change-Id: I7713a9ad9a1604b17119ecad4970e2aa46c15bd0
      fb873176
    • Jeff Vander Stoep's avatar
      kernel: remove domain_deprecated attribute · 108677ce
      Jeff Vander Stoep authored
      No "granted" messages for the removed permissions observed in three
      months of log audits.
      
      Bug: 28760354
      Change-Id: I6bd9525b663a2bdad4f5b2d4a85d3dd46d5fd106
      108677ce
  3. Sep 11, 2016
    • Jeff Vander Stoep's avatar
      Enforce ioctl command whitelisting on all sockets · bff98015
      Jeff Vander Stoep authored
      Remove the ioctl permission for most socket types. For others, such as
      tcp/udp/rawip/unix_dgram/unix_stream set a default unprivileged whitelist
      that individual domains may extend (except where neverallowed like
      untrusted_app). Enforce via a neverallowxperm rule.
      
      Change-Id: I15548d830f8eff1fd4d64005c5769ca2be8d4ffe
      bff98015
  4. Sep 10, 2016
  5. Sep 09, 2016
  6. Sep 07, 2016
Loading