1. 13 Sep, 2013 7 commits
  2. 12 Sep, 2013 1 commit
    • Nick Kralevich's avatar
      Allow apps to execute app_data_files · a24a991d
      Nick Kralevich authored
      Fixes the following denial:
      
      <5>[28362.335293] type=1400 audit(1378991198.292:24): avc:  denied  { execute } for  pid=1640 comm="facebook.katana" path="/data/data/com.facebook.katana/app_libs/libfb_jpegturbo.so" dev="mmcblk0p23" ino=652556 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:app_data_file:s0 tclass=file
      
      Change-Id: I4a515610149f06f0c49194feb6bc96e9b3080c12
      a24a991d
  3. 10 Sep, 2013 2 commits
    • Alex Klyubin's avatar
      Permit writing to /dev/random and /dev/urandom. · a2477056
      Alex Klyubin authored
      Apps attempting to write to /dev/random or /dev/urandom currently
      succeed, but a policy violation is logged. These two Linux RNG
      devices are meant to be written to by arbitrary apps. Thus, there's
      no reason to deny this capability.
      
      Bug: 10679705
      
      Change-Id: Ife401f1dd2182889471eef7e90fcc92e96f9c4d6
      a2477056
    • Alex Klyubin's avatar
      Permit installd to unlink all types of data_file_type. · 34a8e121
      Alex Klyubin authored
      This enables installd to uninstall or clear data of installed apps
      whose data directory contains unusual file types, such as FIFO.
      
      Bug: 10680357
      
      (cherry picked from commit 839af9ed)
      
      Change-Id: I5715f7d6d3214896ad0456d614b052cf5fb79eef
      34a8e121
  4. 06 Sep, 2013 1 commit
  5. 05 Sep, 2013 2 commits
    • Geremy Condra's avatar
      Merge "Fix more long-tail denials." · 21d13e9b
      Geremy Condra authored
      21d13e9b
    • Geremy Condra's avatar
      Fix more long-tail denials. · 217f8afc
      Geremy Condra authored
      For additional context-
      
      The denials related to init_tmpfs are of the form:
      
      denied  { read } for  pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file
      
      (the path above is "/dev/ashmem/dalvik-heap (deleted)")
      
      The denials related to executing things from the dalvik cache are of the form:
      
      enied  { execute } for  pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file
      
      The denials related to isolated_app and the init socket are:
      
      denied  { getattr } for  pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      The getopt denials for the aforementioned socket are:
      
      denied  { getopt } for  pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
      217f8afc
  6. 04 Sep, 2013 3 commits
  7. 30 Aug, 2013 2 commits
  8. 29 Aug, 2013 1 commit
  9. 28 Aug, 2013 4 commits
  10. 23 Aug, 2013 2 commits
  11. 20 Aug, 2013 2 commits
  12. 17 Aug, 2013 2 commits
  13. 16 Aug, 2013 1 commit
  14. 14 Aug, 2013 2 commits
  15. 08 Aug, 2013 1 commit
  16. 06 Aug, 2013 1 commit
  17. 05 Aug, 2013 1 commit
  18. 30 Jul, 2013 1 commit
  19. 26 Jul, 2013 1 commit
  20. 17 Jul, 2013 1 commit
  21. 16 Jul, 2013 2 commits