Ajay Panicker
82f9989062
Allow bluetooth service to access bluetooth directory and add /logs (6/6) am: a45672614d
...
am: ebcc814eb5
Change-Id: Iabada4aedcd7752909f985ca0cb09d0d7613c44d
2016-09-19 20:18:58 +00:00
Ajay Panicker
ebcc814eb5
Allow bluetooth service to access bluetooth directory and add /logs (6/6)
...
am: a45672614d
Change-Id: I295c9a5fb67688538d2cbc4470b9bf463e2cd3e3
2016-09-19 20:11:01 +00:00
Ajay Panicker
a45672614d
Allow bluetooth service to access bluetooth directory and add /logs (6/6)
...
Bug: 31466840
Change-Id: I3984754034349e6c41de6ae9cccbaab95ca5a918
2016-09-16 20:20:31 +00:00
Fyodor Kupolov
eb7ecd7199
Merge "Allow system_server to delete directories in preloads" am: f23299c547
...
am: 66c10511ee
Change-Id: I17cc645175060c6465b6571d25f31fb6f21c9a91
2016-09-15 19:42:01 +00:00
Fyodor Kupolov
66c10511ee
Merge "Allow system_server to delete directories in preloads"
...
am: f23299c547
Change-Id: I5a9bc357635f8567ecd37a1041c1330decb43f0f
2016-09-15 19:40:02 +00:00
Treehugger Robot
f23299c547
Merge "Allow system_server to delete directories in preloads"
2016-09-15 18:18:24 +00:00
Janis Danisevskis
254e36b3ab
Allow debuggerd execmem on debuggable domains am: 071b935d0b
...
am: 241f358f73
Change-Id: Icf5fcaf9725bfb5dd01fcba0d8e88229e359e27e
2016-09-15 16:33:31 +00:00
Fyodor Kupolov
3189945192
Allow system_server to delete directories in preloads
...
(cherry picked from commit 028ed753b5
)
avc: denied { rmdir } for name="apps" scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0
avc: denied { rmdir } for name="demo" scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0
Bug: 28855287
Change-Id: Ia470f94d1d960cc4ebe68cb364b8425418acdbd4
2016-09-15 09:31:05 -07:00
Janis Danisevskis
241f358f73
Allow debuggerd execmem on debuggable domains
...
am: 071b935d0b
Change-Id: I77d1b7c6797d1401abc5e49617090f2e55cee2f6
2016-09-15 16:31:00 +00:00
Janis Danisevskis
071b935d0b
Allow debuggerd execmem on debuggable domains
...
In anticipation of fixing a loophole in the Linux kernel that allows
circumventing the execmem permission by using the ptrace interface,
this patch grants execmem permission on debuggable domains to
debuggerd. This will be required for setting software break points
once the kernel has been fixed.
Bug: 31000401
Change-Id: I9b8d5853b643d24b94d36e2adbcb135dbaef8b1e
2016-09-15 15:11:31 +01:00
Janis Danisevskis
5c3b1cdd67
Merge "Allow keystore to access KeyAttestationApplicationIDProviderService" am: 1a640f327d
...
am: 8e74f2f817
Change-Id: I4927882190874226b2d1ca6a5f824552988a02e0
2016-09-14 21:33:04 +00:00
Janis Danisevskis
8e74f2f817
Merge "Allow keystore to access KeyAttestationApplicationIDProviderService"
...
am: 1a640f327d
Change-Id: Ic6cd61685cd27b4a9213697eb24870aea91b0542
2016-09-14 21:29:32 +00:00
Treehugger Robot
1a640f327d
Merge "Allow keystore to access KeyAttestationApplicationIDProviderService"
2016-09-14 21:11:00 +00:00
Jeff Vander Stoep
6ce7513653
Merge "nfc: allow access to drmserver_service" am: 52c8adb34a
...
am: 2c24ec8bb3
Change-Id: I13929222fe188267325cd253658955ddcb9986f6
2016-09-14 20:06:51 +00:00
Jeff Vander Stoep
2c24ec8bb3
Merge "nfc: allow access to drmserver_service"
...
am: 52c8adb34a
Change-Id: Icc1dacfe3e9009c777a697e9c16884d8be7d2b50
2016-09-14 20:03:54 +00:00
Treehugger Robot
52c8adb34a
Merge "nfc: allow access to drmserver_service"
2016-09-14 19:59:19 +00:00
Takahiro Aizawa
61043ff5cc
Merge "selinux: Update policies for mediadrmserver" am: 0dc5d020ac
...
am: 75bbefc03a
Change-Id: I2b3f2c7f1315d25a3d3ae66768fed3fcd4c4e079
2016-09-14 19:48:58 +00:00
Tianjie Xu
88fae39798
Add sepolicy for update_verifier am: 59379d8b48
...
am: 8a521266d2
Change-Id: I3c504611c5a17ff2311ab961f5c1e92e13955582
2016-09-14 19:48:58 +00:00
Tao Bao
a3e136f897
update_verifier: Allow searching /dev/block. am: 1e17dafc6d
...
am: 58a3175c80
Change-Id: I1a421302231862c24ec7750d72e4a37b46ac5675
2016-09-14 19:48:55 +00:00
Takahiro Aizawa
75bbefc03a
Merge "selinux: Update policies for mediadrmserver"
...
am: 0dc5d020ac
Change-Id: Ie03dd802e556b881c17ffe1701312e025ad75491
2016-09-14 19:42:57 +00:00
Tianjie Xu
8a521266d2
Add sepolicy for update_verifier
...
am: 59379d8b48
Change-Id: Ifb74c4dc2b611edd3549a0882faaa85d14654b32
2016-09-14 19:42:57 +00:00
Tao Bao
58a3175c80
update_verifier: Allow searching /dev/block.
...
am: 1e17dafc6d
Change-Id: Ic500bc6ef04d33c38aeaf3400944d6d732a38128
2016-09-14 19:42:54 +00:00
Treehugger Robot
0dc5d020ac
Merge "selinux: Update policies for mediadrmserver"
2016-09-14 19:36:45 +00:00
Tianjie Xu
59379d8b48
Add sepolicy for update_verifier
...
(cherry picked from commit 5d8d2dc9f9
)
Grant update_verifier the permissions to read /data/ota_package/
and the blocks on system partition.
The denial messages:
update_verifier: type=1400 audit(0.0:29): avc: denied { read }
scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
update_verifier: type=1400 audit(0.0:30): avc: denied { open }
scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
update_verifier: type=1400 audit(0.0:31): avc: denied { read } dev="tmpfs"
scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
update_verifier: type=1400 audit(0.0:32): avc: denied { open } dev="tmpfs"
scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
Test: On device, update_verifier reads the blocks successfully during boot time.
Bug: 30020920
Change-Id: I10777c1e6ba649b82c4a73171124742edeb05997
2016-09-14 19:31:22 +00:00
Tao Bao
1e17dafc6d
update_verifier: Allow searching /dev/block.
...
update_verifier calls bootcontrol HAL to mark the currently booting slot
as successfully booted.
avc: denied { search } for name="block" dev="tmpfs" scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
avc: denied { search } for name="block" dev="tmpfs" scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
Bug: 29569601
Test: Device boots up with no update_verifier denials and 'bootctl is-slot-marked-successful 0' returns 0.
Change-Id: I1baa7819bc829e3c4b83d7168008a5b06b01cc9f
2016-09-14 19:29:06 +00:00
Wei Wang
66dc4709c3
Merge "allow system_server to set bootanim scheduling priority" am: 2c1b02eba6
...
am: 90d84da7e2
Change-Id: I233f337ded37128b3776bba77a11fe741bac9eb9
2016-09-14 19:28:54 +00:00
Wei Wang
90d84da7e2
Merge "allow system_server to set bootanim scheduling priority"
...
am: 2c1b02eba6
Change-Id: I3e666f32b37a87749780d6b6aaaa7a46c698a66e
2016-09-14 19:25:53 +00:00
Janis Danisevskis
61e5ccae9e
Allow keystore to access KeyAttestationApplicationIDProviderService
...
(cherry picked from commit 58b079a259
)
Bug: 22914603
Change-Id: I8ae1a786702694ca2bb8707a4c142b8a233042ee
2016-09-14 19:24:48 +00:00
Treehugger Robot
2c1b02eba6
Merge "allow system_server to set bootanim scheduling priority"
2016-09-14 19:22:48 +00:00
Hugo Benichi
8c488decc6
Merge "New service name for IpConnectivity metrics" am: ed06b57b77
...
am: cd66025669
Change-Id: I8f3c466e26835b8c45f179c07cdfb0dece4e9712
2016-09-14 19:20:23 +00:00
Hugo Benichi
cd66025669
Merge "New service name for IpConnectivity metrics"
...
am: ed06b57b77
Change-Id: I794baa7503672277af9accc13b53d6d66715bf16
2016-09-14 19:17:23 +00:00
Treehugger Robot
ed06b57b77
Merge "New service name for IpConnectivity metrics"
2016-09-14 19:04:10 +00:00
Martijn Coenen
053df7d9fa
Allow the NFC process to access hwservicemanager. am: 50ab0b1ace
...
am: 41726e3420
Change-Id: I0be76fe8adc4da1cef7aa4fda3bf85f183bf1259
2016-09-14 17:55:49 +00:00
Martijn Coenen
8b01f03284
Initial hardware servicemanager sepolicy. am: 6b952393f6
...
am: 1988efc001
Change-Id: I07f2f4ab6a050352fda0d8c43e12ecba0ce4bcdf
2016-09-14 17:55:47 +00:00
Jeff Vander Stoep
2a00c64a4f
nfc: allow access to drmserver_service
...
(cherry picked from commit 24ad5862bd
)
avc: denied { find } for service=drm.drmManager pid=4320 uid=1027 scontext=u:r:nfc:s0 tcontext=u:object_r:drmserver_service:s0 tclass=service_manager
Arrange in alphabetical order.
Bug: 30112127
Change-Id: I6592497a937c6a6d2c7c3d444beba3db333f4852
2016-09-14 17:53:27 +00:00
Martijn Coenen
41726e3420
Allow the NFC process to access hwservicemanager.
...
am: 50ab0b1ace
Change-Id: I26c87e57827a7dfdd24a290c6f942c93b77d3952
2016-09-14 17:52:49 +00:00
Martijn Coenen
1988efc001
Initial hardware servicemanager sepolicy.
...
am: 6b952393f6
Change-Id: I190a397a35e5aa4ee0ddbe7b4638c08d5461f9c0
2016-09-14 17:52:46 +00:00
Takahiro Aizawa
ec7508546b
selinux: Update policies for mediadrmserver
...
(cherry picked from commit 23a276a295
)
DRM 3rd party application with platform signature
requires the permission.
Bug: 30352348
Change-Id: Idd673506764ae435db1be8cc8c13658541ffa687
2016-09-14 10:32:56 -07:00
Hugo Benichi
c1c82606f1
New service name for IpConnectivity metrics
...
(cherry picked from commit f412cc623f
)
Bug: 31254800
Change-Id: If8708c8a4e0ea7655f31028881248a14cf2ba5f7
2016-09-14 10:19:02 -07:00
Wei Wang
88323b2e6d
allow system_server to set bootanim scheduling priority
...
(cherry picked from commit 1617c0ce89
)
Addresses the following denial:
avc: denied { setsched } for pid=1405 comm="Binder:1094_3" scontext=u:r:system_server:s0 tcontext=u:r:bootanim:s0 tclass=process permissive=0
Maybe fix bug 30118894.
Bug: 30118894
Change-Id: I29be26c68094c253778edc8e4fef2ef1a238ee2e
2016-09-14 10:15:15 -07:00
Martijn Coenen
50ab0b1ace
Allow the NFC process to access hwservicemanager.
...
Add a macro to make this easier for other processes
as well.
Change-Id: I489d0ce042fe5ef88dc767a6fbdb9b795be91601
(cherry picked from commit c2b9c1561e4bd7ac86d78b44ca7927994e781da0)
2016-09-14 16:47:09 +00:00
Martijn Coenen
6b952393f6
Initial hardware servicemanager sepolicy.
...
Change-Id: I07d188e4dd8801a539db1e9f3edf82a1d662648e
(cherry picked from commit 61a082a55dbc2798d50d0d4b766151d69334729a)
2016-09-14 16:35:34 +00:00
Jeff Tinker
c2103a9710
Merge "Fix SELinux denials for protected content playback" am: 36e260f772
...
am: 90bca6f3c4
Change-Id: I8244b828412f6253b811c4bf0f849081a6adf6e4
2016-09-14 02:55:51 +00:00
Jeff Tinker
90bca6f3c4
Merge "Fix SELinux denials for protected content playback"
...
am: 36e260f772
Change-Id: I2f60519c6a6c5db363dffbe380964e7244359df1
2016-09-14 02:52:50 +00:00
Treehugger Robot
36e260f772
Merge "Fix SELinux denials for protected content playback"
2016-09-14 02:35:37 +00:00
Andreas Gampe
04718d5626
sepolicy: give otapreopt getattr am: f9c741b860
...
am: 35a560a4a4
Change-Id: Iad42e7a445239aeb60ce33c5d4b9e098d69f1133
2016-09-13 22:00:32 +00:00
Andreas Gampe
feaeddce46
Sepolicy: Add otapreopt_slot am: a3a0bb446b
...
am: c81a0a1a5e
Change-Id: I837306c006333141d350b9e7d86058af2fed2f4d
2016-09-13 22:00:30 +00:00
Andreas Gampe
35a560a4a4
sepolicy: give otapreopt getattr
...
am: f9c741b860
Change-Id: If468d207717615cb22f651efface9d60922e96b9
2016-09-13 21:57:32 +00:00
Andreas Gampe
c81a0a1a5e
Sepolicy: Add otapreopt_slot
...
am: a3a0bb446b
Change-Id: I4c38cdbe36829a38289bd5a7c8cea46c735ed7b8
2016-09-13 21:57:30 +00:00
Andreas Gampe
dc3f6fab00
Merge "Sepolicy: allow otapreopt_chroot to mount vendor" am: 9eae9a7181
...
am: cbb4c08d7c
Change-Id: I6bd1ab3c9c5b2d9472b16e15455705286c81f65c
2016-09-13 20:48:49 +00:00