1. 24 Apr, 2015 10 commits
  2. 20 Apr, 2015 2 commits
  3. 18 Apr, 2015 5 commits
    • Jeff Sharkey's avatar
      am e98cda25: Grant apps write access to returned vfat FDs. · 479a536a
      Jeff Sharkey authored
      * commit 'e98cda25':
        Grant apps write access to returned vfat FDs.
      479a536a
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
    • Jeff Sharkey's avatar
      am c9036fb1: Grant platform apps access to /mnt/media_rw. · bb0385e2
      Jeff Sharkey authored
      * commit 'c9036fb1':
        Grant platform apps access to /mnt/media_rw.
      bb0385e2
    • Jeff Sharkey's avatar
      Grant platform apps access to /mnt/media_rw. · c9036fb1
      Jeff Sharkey authored
      Raw physical storage devices are mounted by vold under /mnt/media_rw
      and then wrapped in a FUSE daemon that presents them under /storage.
      
      Normal apps only have access through /storage, but platform apps
      (such as ExternalStorageProvider) often bypass the FUSE daemon for
      performance reasons.
      
      avc: denied { search } for pid=6411 comm="Binder_1" name="media_rw" dev="tmpfs" ino=6666 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { write } for pid=3701 comm="Binder_2" name="PANO_20131016_162457.jpg" dev="sda1" ino=127 scontext=u:r:platform_app:s0:c522,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I66df236eade3ca25a10749dd43d173ff4628cfad
      c9036fb1
    • Nick Kralevich's avatar
      gatekeeperd: use more specific label for /data file · 367757d2
      Nick Kralevich authored
      Use a more specific label for /data/misc/gatekeeper
      
      Rearrange some other rules.
      
      Change-Id: Ib634e52526cf31a8f0a0e6d12bbf0f69dff8f6b5
      367757d2
  4. 17 Apr, 2015 3 commits
  5. 16 Apr, 2015 5 commits
  6. 14 Apr, 2015 2 commits
  7. 13 Apr, 2015 4 commits
  8. 12 Apr, 2015 3 commits
  9. 11 Apr, 2015 2 commits
  10. 10 Apr, 2015 4 commits