Skip to content
Snippets Groups Projects
  1. Jun 22, 2016
    • Tao Bao's avatar
      update_verifier: Allow searching /dev/block. · 6a9c4d4c
      Tao Bao authored
      update_verifier calls bootcontrol HAL to mark the currently booting slot
      as successfully booted.
      
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      
      Bug: 29569601
      Test: Marlin boots up with no update_verifier denials and 'bootctl is-slot-marked-successful 0' returns 0.
      Change-Id: I1baa7819bc829e3c4b83d7168008a5b06b01cc9f
      6a9c4d4c
    • David Brazdil's avatar
    • Alex Deymo's avatar
      Allow update_engine to suspend/resume postinstall. · 9640bcfa
      Alex Deymo authored
      update_engine launches the postinstall process and can suspend and
      resume it by sending SIGSTOP and SIGCONT. This fixes the following
      denials:
      
      update_engine: type=1400 audit(0.0:88): avc: denied { sigstop } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      update_engine: type=1400 audit(0.0:89): avc: denied { signal } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      
      Bug: 28959137
      TEST=`update_engine_client --suspend ; update_engine_client --resume` while the device is running postinstall.
      
      (cherry picked from commit 108b74a1)
      
      Change-Id: Iec8e10fe0cfda5c0764d2e5ad90ea1c6dd13dab2
      9640bcfa
  2. Jun 20, 2016
  3. Jun 17, 2016
  4. Jun 16, 2016
  5. Jun 15, 2016
    • Amith Yamasani's avatar
      Allow installd to delete the foreign-dex folder · a4e2aa13
      Amith Yamasani authored
      Grant installd the policies to recursively delete
      the foreign-dex folder when removing a user. Otherwise
      the user cleanup will partially fail and cause a boot loop
      when the userId is reused as some later point.
      
      Bug: 29285673
      Change-Id: I023f150cffbeb10b6014f48bca9eb0922c2d630a
      a4e2aa13
  6. Jun 14, 2016
    • dcashman's avatar
      Keep pre-existing sysfs write permissions. · 17cfd3fc
      dcashman authored
      Commit: b144ebab added the sysfs_usb
      type and granted the read perms globally, but did not add write
      permissions for all domains that previously had them.  Add the ability
      to write to sysfs_usb for all domains that had the ability to write to
      those files previously (sysfs).
      
      Address denials such as:
      type=1400 audit(1904.070:4): avc:  denied  { write } for  pid=321 comm="ueventd" name="uevent" dev="sysfs" ino=1742 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_usb:s0 tclass=file permissive=0
      
      Bug: 28417852
      Change-Id: I4562ea73f2158ebefba74b58ca572f2176d1b849
      17cfd3fc
    • Nick Kralevich's avatar
      Add SIOCGSTAMP SIOCGSTAMPNS to unpriv_sock_ioctls · 30eddd7f
      Nick Kralevich authored
      am: 92e79e22
      
      Change-Id: I120a8a0a73ec37adee5771f7ffcc7be695b4c141
      30eddd7f
    • Nick Kralevich's avatar
      Add SIOCGSTAMP SIOCGSTAMPNS to unpriv_sock_ioctls · 92e79e22
      Nick Kralevich authored
      Per "man socket":
      
        SIOCGSTAMP
        Return a struct timeval with the receive timestamp of the last packet
        passed to the user. This is useful for accurate round trip time
        measurements. See setitimer(2) for a description of struct timeval.
        This ioctl should only be used if the socket option SO_TIMESTAMP is
        not set on the socket. Otherwise, it returns the timestamp of the last
        packet that was received while SO_TIMESTAMP was not set, or it fails
        if no such packet has been received, (i.e., ioctl(2) returns -1 with
        errno set to ENOENT).
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=6E6574776F726B5F74687265616420
      path="socket:[42934]" dev="sockfs" ino=42934 ioctlcmd=8906
      scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:r:untrusted_app:s0:c512,c768 tclass=udp_socket permissive=0
      
      Bug: 29333189
      Change-Id: I916a695fa362cf1cf6759629c7f6101e9f657e7d
      92e79e22
  7. Jun 13, 2016
  8. Jun 10, 2016
    • Marco Nelissen's avatar
      reduce mediaserver permissions · b590d49b
      Marco Nelissen authored
      am: f8f4d3e1
      
      Change-Id: If2975c226b86c11595f5c41a964783f7e9caa171
      b590d49b
    • Marco Nelissen's avatar
      reduce mediaserver permissions · f8f4d3e1
      Marco Nelissen authored
      It no longer needs access to audio and camera
      
      Bug: 22775369
      Change-Id: I1de1f0e3504b214d6943733bf60eb83654b71048
      f8f4d3e1
    • dcashman's avatar
      Allow access to sysfs usb nodes. · b144ebab
      dcashman authored
      Some legitimate functionality currently requires direct sysfs access
      that is not otherwise possible via the android APIs.  Specifically,
      isochronous USB transfers require this direct access, without which USB
      audio applications would noticibly suffer.
      
      Grant read access to the usb files under /sys/devices to prevent this
      regression.
      
      Bug: 28417852
      Change-Id: I3424bf3498ffa0eb647a54cc962ab8c54f291728
      b144ebab
  9. Jun 09, 2016
  10. Jun 08, 2016
  11. Jun 07, 2016
  12. Jun 06, 2016
  13. Jun 03, 2016
Loading