Skip to content
Snippets Groups Projects
  1. Aug 15, 2016
  2. Aug 13, 2016
    • Andreas Gampe's avatar
      sepolicy: give otapreopt getattr · 88c51465
      Andreas Gampe authored
      Allow the otapreopt rename script to read file attributes. This is
      being used to print the aggregate artifact size for diagnostic
      purposes.
      
      Bug: 30832951
      Change-Id: Iee410adf59dcbb74fa4b49edb27d028025cd8bf9
      88c51465
  3. Aug 10, 2016
    • Alex Deymo's avatar
      Allow executing update_engine_sideload from recovery. · 27f19427
      Alex Deymo authored
      The recovery flow for A/B devices allows to sideload an OTA downloaded
      to a desktop and apply from recovery. This patch allows the "recovery"
      context to perform all the operations required to apply an update as
      update_engine would do in the background. These rules are now extracted
      into a new attributte called update_engine_common shared between
      recovery and update_engine.
      
      Bug: 27178350
      
      (cherry picked from commit d63084d3)
      
      Change-Id: I1f3e1e83a21e37e09b69cd9c497f87b42b9cbeb1
      27f19427
  4. Jul 22, 2016
  5. Jul 20, 2016
  6. Jul 19, 2016
  7. Jul 15, 2016
  8. Jul 14, 2016
  9. Jul 13, 2016
  10. Jul 12, 2016
    • Andreas Gampe's avatar
      Sepolicy: allow otapreopt_chroot to mount vendor · ec4b9d67
      Andreas Gampe authored
      Vendor apps are usually not preopted, so A/B dexopt should pick
      them up. update_engine is not mounting the vendor partition, so
      let otapreopt_chroot do the work.
      
      This change gives otapreopt_chroot permission to mount /vendor
      into the chroot environment.
      
      Bug: 25612095
      Bug: 29498238
      Change-Id: I5a77bdb78a8e478ce10f6c1d0f911a8d6686becb
      ec4b9d67
  11. Jul 11, 2016
    • Andreas Gampe's avatar
      Sepolicy: Add otapreopt_slot · eb717421
      Andreas Gampe authored
      The new A/B OTA artifact naming scheme includes the target slot so
      that the system is robust with respect to unexpected reboots. This
      complicates the renaming code after reboot, so it is moved from the
      zygote into a simple script (otapreopt_slot) that is hooked into
      the startup sequence in init.
      
      Give the script the subset of the rights that the zygote had so that
      it can move the artifacts from /data/ota into /data/dalvik-cache.
      Relabeling will be done in the init rc component, so relabeling
      rights can be completely removed.
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: Iad56dc3d78ac759f4f2cce65633cdaf1cab7631b
      eb717421
    • Andreas Gampe's avatar
      Sepolicy: Adapt for new A/B OTA flow · d47c1e93
      Andreas Gampe authored
      To include target slot names in the naming of A/B OTA artifacts,
      and new path has been implemented. Instead of passing through
      the system server and forking off of installd, otapreopt_chroot
      is now driven directly from the otapreopt script.
      
      Change the selinux policy accordingly: allow a transition from
      postinstall to otapreopt_chroot, and let otapreopt_chroot inherit
      the file descriptors that update_engine had opened (it will close
      them immediately, do not give rights to the downstream executables
      otapreopt and dex2oat).
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: I6b476183572c85e75eda4d52f60e4eb5d8f48dbb
      d47c1e93
  12. Jul 07, 2016
  13. Jul 06, 2016
  14. Jun 29, 2016
  15. Jun 28, 2016
  16. Jun 27, 2016
  17. Jun 25, 2016
  18. Jun 24, 2016
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · c5266df9
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      Change-Id: Ia876cc1dfd5b12908c59bd9e8620a6b890729c28
      c5266df9
  19. Jun 23, 2016
Loading