Skip to content
Snippets Groups Projects
  1. Aug 22, 2016
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · 69fe5d07
      Nick Kralevich authored
      am: c55cf17a
      
      Change-Id: I48f8bbfab4cdd36e6f1555919ff5d032c07af0a2
      69fe5d07
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · 81fb2363
      Eino-Ville Talvala authored
      am: eedacf83
      
      Change-Id: I4b23d564c6a4787180fea2c1530cc78808cbd0d0
      81fb2363
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · c55cf17a
      Nick Kralevich authored
      Apparently some manufacturers sign APKs with the platform key
      which use renderscript. Renderscript works by compiling the
      .so file, and placing it in the app's home directory, where the
      app loads the content.
      
      Drop platform_app from the neverallow restriction to allow partners
      to add rules allowing /data execute for this class of apps.
      
      We should revisit this in the future after we have a better
      solution for apps which use renderscript.
      
      Bug: 29857189
      Change-Id: I058a802ad5eb2a67e657b6d759a3ef4e21cbb8cc
      c55cf17a
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · eedacf83
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      
      (cherry picked from commit c5266df9)
      
      Change-Id: I4adb58e8c8b35122d6295db58cedaa355cdd3924
      eedacf83
  2. Aug 17, 2016
  3. Aug 15, 2016
  4. Aug 13, 2016
    • Andreas Gampe's avatar
      sepolicy: give otapreopt getattr · 88c51465
      Andreas Gampe authored
      Allow the otapreopt rename script to read file attributes. This is
      being used to print the aggregate artifact size for diagnostic
      purposes.
      
      Bug: 30832951
      Change-Id: Iee410adf59dcbb74fa4b49edb27d028025cd8bf9
      88c51465
  5. Aug 10, 2016
    • Alex Deymo's avatar
      Allow executing update_engine_sideload from recovery. · 27f19427
      Alex Deymo authored
      The recovery flow for A/B devices allows to sideload an OTA downloaded
      to a desktop and apply from recovery. This patch allows the "recovery"
      context to perform all the operations required to apply an update as
      update_engine would do in the background. These rules are now extracted
      into a new attributte called update_engine_common shared between
      recovery and update_engine.
      
      Bug: 27178350
      
      (cherry picked from commit d63084d3)
      
      Change-Id: I1f3e1e83a21e37e09b69cd9c497f87b42b9cbeb1
      27f19427
  6. Jul 22, 2016
  7. Jul 20, 2016
  8. Jul 19, 2016
  9. Jul 15, 2016
  10. Jul 14, 2016
  11. Jul 13, 2016
  12. Jul 12, 2016
    • Andreas Gampe's avatar
      Sepolicy: allow otapreopt_chroot to mount vendor · ec4b9d67
      Andreas Gampe authored
      Vendor apps are usually not preopted, so A/B dexopt should pick
      them up. update_engine is not mounting the vendor partition, so
      let otapreopt_chroot do the work.
      
      This change gives otapreopt_chroot permission to mount /vendor
      into the chroot environment.
      
      Bug: 25612095
      Bug: 29498238
      Change-Id: I5a77bdb78a8e478ce10f6c1d0f911a8d6686becb
      ec4b9d67
  13. Jul 11, 2016
    • Andreas Gampe's avatar
      Sepolicy: Add otapreopt_slot · eb717421
      Andreas Gampe authored
      The new A/B OTA artifact naming scheme includes the target slot so
      that the system is robust with respect to unexpected reboots. This
      complicates the renaming code after reboot, so it is moved from the
      zygote into a simple script (otapreopt_slot) that is hooked into
      the startup sequence in init.
      
      Give the script the subset of the rights that the zygote had so that
      it can move the artifacts from /data/ota into /data/dalvik-cache.
      Relabeling will be done in the init rc component, so relabeling
      rights can be completely removed.
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: Iad56dc3d78ac759f4f2cce65633cdaf1cab7631b
      eb717421
    • Andreas Gampe's avatar
      Sepolicy: Adapt for new A/B OTA flow · d47c1e93
      Andreas Gampe authored
      To include target slot names in the naming of A/B OTA artifacts,
      and new path has been implemented. Instead of passing through
      the system server and forking off of installd, otapreopt_chroot
      is now driven directly from the otapreopt script.
      
      Change the selinux policy accordingly: allow a transition from
      postinstall to otapreopt_chroot, and let otapreopt_chroot inherit
      the file descriptors that update_engine had opened (it will close
      them immediately, do not give rights to the downstream executables
      otapreopt and dex2oat).
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: I6b476183572c85e75eda4d52f60e4eb5d8f48dbb
      d47c1e93
  14. Jul 08, 2016
    • Fyodor Kupolov's avatar
      Allow system_server to delete directories in preloads · 028ed753
      Fyodor Kupolov authored
      avc: denied { rmdir } for name="apps" dev="sda35" ino=38 scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0
      avc: denied { rmdir } for name="demo" dev="sda35" ino=41 scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0
      
      Bug: 28855287
      Change-Id: Ia470f94d1d960cc4ebe68cb364b8425418acdbd4
      028ed753
  15. Jul 07, 2016
  16. Jul 06, 2016
Loading