- 10 Oct, 2013 1 commit
-
-
Geremy Condra authored
Fixes: denied { relabelto } for pid=721 comm="PackageManager" name="vmdl-112554949.tmp" dev="mmcblk0p30" ino=712747 scontext=u:r:system:s0 tcontext=u:object_r:apk_private_tmp_file:s0 tclass=file denied { create } for pid=240 comm="vold" name="smdl2tmp1.asec" scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=file Bug: 11149726 Change-Id: Iddc7592c757375a961f0d392c27622073c141b36
-
- 08 Oct, 2013 1 commit
-
-
Ed Heyl authored
-
- 18 Sep, 2013 1 commit
-
-
The Android Automerger authored
-
- 17 Sep, 2013 1 commit
-
-
Geremy Condra authored
The specific denials we see are: denied { getattr } for pid=169 comm=""installd"" path=""/data/data/com.android.providers.downloads/cache/downloadfile.jpeg"" dev=""mmcblk0p23"" ino=602861 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=file denied { fsetid } for pid=598 comm=""netd"" capability=4 scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=capability denied { read } for pid=209 comm=""installd"" name=""cache"" dev=""mmcblk0p28"" ino=81694 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=dir Bug: 10786017 Change-Id: Ia5d0b6337f3de6a168ac0d5a77df2a1ac419ec29
-
- 12 Sep, 2013 1 commit
-
-
The Android Automerger authored
-
- 11 Sep, 2013 5 commits
-
-
Geremy Condra authored
-
Geremy Condra authored
This fixes an issue in which installd can't open download file dirs. Bug: 10710450 Change-Id: I1dd08188a88428143c4bb914e872175dc3755597
-
Geremy Condra authored
This fixes an issue in which installd can't open download file dirs. Bug: 10710450 Change-Id: I1dd08188a88428143c4bb914e872175dc3755597
-
Geremy Condra authored
Bug: 10706792 Change-Id: I85085ab7a6f0f3d12ba4d2b21b655bb64795495f
-
Ken Sumrall authored
This is needed for the new fuse wrapped sdcard support. bug: 10330128 Change-Id: Ic5ebc769d376bf061d237616e56bcd562a63c6be
-
- 10 Sep, 2013 4 commits
-
-
The Android Automerger authored
-
Nick Kralevich authored
Part of d615ef34 hasn't been backported to klp-dev yet. Do it now. Change-Id: Ib4f26c64d376e236fa3f76166f5d78a9f28b79a3
-
Nick Kralevich authored
Bug: 10680357 Change-Id: I2a20f4aaaa53acbd53a404d369a79ae47246ad6f
-
Alex Klyubin authored
Bug: 10498304 Change-Id: I74cac92368353694612dbd94f0d072b97ec9878b
-
- 09 Sep, 2013 2 commits
-
-
Nick Kralevich authored
Bug: 10498304 Change-Id: Ic0e30bdf6cc35f9d9e2752f36940e75e7ae37d83
-
Nick Kralevich authored
Bug: 10498304 Change-Id: Ic0e30bdf6cc35f9d9e2752f36940e75e7ae37d83
-
- 05 Sep, 2013 1 commit
-
-
Geremy Condra authored
This fixes another bug encountered while taking bugreports. Bug: 10498304 Change-Id: Ie33e869ccd28c5461f4f3736c078b2a865aa7cdd
-
- 04 Sep, 2013 1 commit
-
-
Geremy Condra authored
This fixes another bug encountered while taking bugreports. Bug: 10498304 Change-Id: Ie33e869ccd28c5461f4f3736c078b2a865aa7cdd
-
- 29 Aug, 2013 1 commit
-
-
The Android Automerger authored
-
- 28 Aug, 2013 1 commit
-
-
Geremy Condra authored
Bug: 10455872 Change-Id: I98885e8cd1e4f9ab0d3e2af6d79b078a000db539
-
- 17 Aug, 2013 1 commit
-
-
Geremy Condra authored
Bug: 10290009 Change-Id: Ic794299261672b36a2b630893b65ab176c3eee6b (cherry picked from commit eaa4e844e4c8549c9b4808a1272876a6995ca5a7)
-
- 16 Aug, 2013 1 commit
-
-
Geremy Condra authored
Bug: 10290009 Change-Id: Ic794299261672b36a2b630893b65ab176c3eee6b (cherry picked from commit eaa4e844e4c8549c9b4808a1272876a6995ca5a7)
-
- 06 Aug, 2013 1 commit
-
-
The Android Automerger authored
-
- 05 Aug, 2013 1 commit
-
-
Lorenzo Colitti authored
Bug: 10175701 Change-Id: I185df22bdbaafd56725760ec6c71340b67455046
-
- 30 Jul, 2013 1 commit
-
-
The Android Automerger authored
-
- 26 Jul, 2013 1 commit
-
-
Todd Poynor authored
-
- 17 Jul, 2013 1 commit
-
-
The Android Automerger authored
-
- 16 Jul, 2013 6 commits
-
-
Alex Klyubin authored
Change-Id: Ided2cf793e94bb58529789c3075f8480c0d0cf4e
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
Bug: 9872463 Change-Id: I47eabeace3387afd24c0fd4bee70e77c0a3586d5
-
The Android Automerger authored
-
Nick Kralevich authored
Bug: 9859477 Change-Id: Iadd26cac2f318b81701310788bed795dadfa5b6b
-
- 15 Jul, 2013 6 commits
-
-
Nick Kralevich authored
This is needed to support "Verify App" functionality. During side loading, the Verify App functionality reads the APK to determine if it's safe to install. Bug: 9863154 Change-Id: I33f6b0fd012f6cb194e253d5d92cf6189d6aa222
-
Nick Kralevich authored
-
Nick Kralevich authored
/sys was getting labeled as a rootfs file, but according to genfs_contexts, it's really a sysfs file. This conflict is causing problems when patch f29c533c49ab1c90eae612b1c454f2c6879a6658 from system/core is applied. Change-Id: I3f34c9ee68bedb171ebebfcd356e924c987b58ff
-
Nick Kralevich authored
-
Nick Kralevich authored
For some reason, the debuggerd socket isn't getting properly labeled. Work around this bug for now by allowing all domains to connect to all unix stream sockets. Bug: 9858255 Change-Id: If994e51b0201ea8cae46341efc76dc71a4e577c8
-
The Android Automerger authored
-
- 14 Jul, 2013 1 commit
-
-
Nick Kralevich authored
This is my first attempt at creating an enforcing SELinux domain for apps, untrusted_apps, and isolated_apps. Much of these rules are based on the contents of app.te as of commit 11153ef3 with extensive modifications, some of which are included below. * Allow communication with netd/dnsproxyd, to allow netd to handle dns requests * Allow binder communications with the DNS server * Allow binder communications with surfaceflinger * Allow an app to bind to tcp/udp ports * Allow all domains to read files from the root partition, assuming the DAC allows access. In addition, I added a bunch of "neverallow" rules, to assert that certain capabilities are never added. This change has a high probability of breaking someone, somewhere. If it does, then I'm happy to fix the breakage, rollback this change, or put untrusted_app into permissive mode. Change-Id: I83f220135d20ab4f70fbd7be9401b5b1def1fe35
-