- Aug 24, 2016
-
-
Chad Brubaker authored
Bug: 28746284 Change-Id: I59aa235ecba05e22aaa531e387a77f47267ac9ae
-
- Aug 23, 2016
-
-
TreeHugger Robot authored
-
Chad Brubaker authored
am: a67411c9 Change-Id: If2ab59c09b2ccf444281fdf9003e36119eb7295f
-
- Aug 22, 2016
-
-
Chad Brubaker authored
Bug: 28746284 Change-Id: Ib5e294402c549d8ed6764722220484c5655951a9
-
Janis Danisevskis authored
Ports check_seapp to pcre2. Change-Id: If3faac5b911765a66eab074f7da2511624c3fc97
-
- Aug 19, 2016
-
-
Janis Danisevskis authored
am: a15ea578 -s ours Change-Id: I8acaaf29d6cd06291c45f3a1fb2e246718543922
-
Janis Danisevskis authored
Ports check_seapp to pcre2. Merged-In: Ib9977326cfbb19ce143b04504f41afb884f2ec17 Bug: 24091652 Change-Id: Ib9977326cfbb19ce143b04504f41afb884f2ec17
-
- Aug 18, 2016
-
-
Hung-ying Tyan authored
am: c3774720 Change-Id: I7ffbc6c1d4213fe68c52ded884bd9db9f6b37fb1
-
- Aug 15, 2016
-
-
Hung-ying Tyan authored
Specifically we need init to relabel (/dev/device-mapper, /dev/block/dm-?) and other files in /dev/block/* from tmpfs to dm_device and block_device respectively. BUG=27805372 Change-Id: I16af6e803f8e4150481137aba24d5406872f9c62
-
- Aug 14, 2016
-
-
Nick Kralevich authored
am: 89a8ed4e Change-Id: I3733a74a23b3ece3a38fa2d7a2b3ea996f95c87f
-
Nick Kralevich authored
-
- Aug 12, 2016
-
-
Elliott Hughes authored
am: c0937b6e Change-Id: I06890bb6755d084f37bf6fb6564e4e1abeac8c06
-
Treehugger Robot authored
-
- Aug 11, 2016
-
-
Elliott Hughes authored
Bug: http://b/30699558 Change-Id: Id9b213967ab290f45d1b8a5ab6712845ac9a0b69 Merged-In: Id9b213967ab290f45d1b8a5ab6712845ac9a0b69
-
- Aug 10, 2016
-
-
Alex Deymo authored
Change-Id: I21dbd14d4e1bd89619e6fff91a85ed3fba02c324
-
- Aug 09, 2016
-
-
Alex Deymo authored
The recovery flow for A/B devices allows to sideload an OTA downloaded to a desktop and apply from recovery. This patch allows the "recovery" context to perform all the operations required to apply an update as update_engine would do in the background. These rules are now extracted into a new attributte called update_engine_common shared between recovery and update_engine. Bug: 27178350 Change-Id: I97b301cb2c039fb002e8ebfb23c3599463ced03a
-
- Aug 08, 2016
-
-
dcashman authored
Change-Id: I2593e100bdad420d0d988fbaeb8d2ec259b8df1d
-
Daniel Micay authored
Change-Id: Ica9a16311075f5cc3744d0e0833ed876e201029f
-
Treehugger Robot authored
-
- Aug 05, 2016
-
-
dcashman authored
Change-Id: I16706423534069f69bd0305ac500a9cd74db55a6
-
Daniel Micay authored
These APIs expose sensitive information via timing side channels. This leaves access via the adb shell intact along with the current uses by dumpstate, init and system_server. The /proc/interrupts and /proc/stat files were covered in this paper: https://www.lightbluetouchpaper.org/2016/07/29/yet-another-android-side-channel/ The /proc/softirqs, /proc/timer_list and /proc/timer_stats files are also relevant. Access to /proc has been greatly restricted since then, with untrusted apps no longer having direct access to these, but stricter restrictions beyond that would be quite useful. Change-Id: Ibed16674856569d26517e5729f0f194b830cfedd
-
William Roberts authored
am: 2b33112a Change-Id: I08987ae7229ebbbbcf980be4aaef2eb8fb7e24da
-
Treehugger Robot authored
-
- Aug 04, 2016
-
-
William Roberts authored
boolean and setenforce macros are not used in base policy and cannot be used in any policy, since they violate neverallow rules. Remove these from the policy. Change-Id: Icc0780eaf06e95af36306031e1f615b05cb79869 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Aug 03, 2016
-
-
John Stultz authored
am: 19b6485f Change-Id: I0574ab7e70a8b3d906a5b11368239d58d1d64e70
-
John Stultz authored
With v4.8+ kernels, CAP_WAKE_ALARM is needed to set alarmtimers via timerfd (this change is likely to be backported to stable as well). However, with selinux enabled, we also need to allow the capability on the system_server so this enables it. Change-Id: I7cd64d587906f3fbc8a129d48a4db07373c74c7e Signed-off-by:
John Stultz <john.stultz@linaro.org>
-
- Jul 27, 2016
-
-
Elliott Hughes authored
am: aa2aa219 Change-Id: I5e1634a8c0cee6cb759e0acea086b68dbd21fb7e
-
Elliott Hughes authored
-
- Jul 26, 2016
-
-
William Roberts authored
Applications should not access /dev/input/* for events, but rather use events handled via the activity mechanism. Change-Id: I0182b6be1b7c69d96e4366ba59f14cee67be4beb Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Elliott Hughes authored
Bug: http://b/30317429 Change-Id: I5c499c48d5e321ebdf588a162d29e949935ad8ee Test: adb shell dmesg | grep ueventd
-
Daniel Rosenberg authored
Change-Id: I87b6797cd2bc9efafe2590e1f69d5787de99af07
-
- Jul 22, 2016
-
-
Eric Bae authored
Change-Id: Ia938d73b1a49b9ba4acf906df37095d21edee22e
-
Daniel Rosenberg authored
Change-Id: I4c318efba76e61b6ab0be9491c352f281b1c2bff Bug: 19160983
-
- Jul 20, 2016
-
-
Jorge Lucangeli Obes authored
am: 23d703ee Change-Id: I98383d496812ced491a892c1ffb29527d77c63a9
-
Treehugger Robot authored
-
Jorge Lucangeli Obes authored
Bug: 30156807 Change-Id: Ie9faf72d35579fa69b4397bdffc8d674f040736c
-
Jeff Vander Stoep authored
Change-Id: Ic549f8c8060a17981302f2af75debf34595475bb
-
Treehugger Robot authored
* changes: adbd: allow reading apk_data_file adbd: allow reading rootfs dir
-
- Jul 19, 2016
-
-
Jeff Vander Stoep authored
avc: denied { search } for comm=73657276696365203139 name="app" dev="sda35" ino=770049 scontext=u:r:adbd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=dir permissive=0 Bug: 30000600 Change-Id: I86958ebcca815ee1779f85fb425592493f40101a
-