Skip to content
Snippets Groups Projects
  1. Aug 22, 2016
  2. Aug 19, 2016
    • Janis Danisevskis's avatar
      Port from pcre to pcre2 · a15ea578
      Janis Danisevskis authored
      Ports check_seapp to pcre2.
      
      Merged-In: Ib9977326cfbb19ce143b04504f41afb884f2ec17
      Bug: 24091652
      Change-Id: Ib9977326cfbb19ce143b04504f41afb884f2ec17
      a15ea578
  3. Aug 15, 2016
    • Hung-ying Tyan's avatar
      Allow init to mount /odm, /vendor early · c3774720
      Hung-ying Tyan authored
      Specifically we need init to relabel (/dev/device-mapper, /dev/block/dm-?)
      and other files in /dev/block/* from tmpfs to dm_device and block_device
      respectively.
      
      BUG=27805372
      
      Change-Id: I16af6e803f8e4150481137aba24d5406872f9c62
      c3774720
  4. Aug 14, 2016
  5. Aug 12, 2016
  6. Aug 11, 2016
  7. Aug 09, 2016
    • Alex Deymo's avatar
      Allow executing update_engine_sideload from recovery. · d63084d3
      Alex Deymo authored
      The recovery flow for A/B devices allows to sideload an OTA downloaded
      to a desktop and apply from recovery. This patch allows the "recovery"
      context to perform all the operations required to apply an update as
      update_engine would do in the background. These rules are now extracted
      into a new attributte called update_engine_common shared between
      recovery and update_engine.
      
      Bug: 27178350
      Change-Id: I97b301cb2c039fb002e8ebfb23c3599463ced03a
      d63084d3
  8. Aug 08, 2016
  9. Aug 05, 2016
  10. Aug 04, 2016
  11. Aug 03, 2016
  12. Jul 27, 2016
  13. Jul 26, 2016
  14. Jul 22, 2016
  15. Jul 20, 2016
  16. Jul 19, 2016
  17. Jul 18, 2016
  18. Jul 15, 2016
    • Treehugger Robot's avatar
    • dcashman's avatar
      Grant untrusted_app dir access to asec_apk_file. · 83348b0b
      dcashman authored
      untrusted_app lost all of the domain_deprecated permissions in N,
      including the ability to read asec_apk_file dirs.  This is used for
      forward locked apps.
      
      Addresses the following denials:
      avc: denied { search } for name="asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0
      avc: denied { getattr } for path="/mnt/asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0
      
      (cherry-pick of internal commit: addd3c9f)
      
      Bug: 30082229
      Change-Id: I87758f1daee19197d9299bca261f0324e01af5e0
      83348b0b
  19. Jul 11, 2016
  20. Jul 08, 2016
  21. Jul 07, 2016
  22. Jul 01, 2016
  23. Jun 28, 2016
    • Jeff Vander Stoep's avatar
      domain: allow reading /proc/sys/vm/overcommit_memory · bc1986fb
      Jeff Vander Stoep authored
      Needed for jemalloc commit:
      
      2f970c32b527660a33fa513a76d913c812dcf7c
      Modify pages_map() to support mapping uncommitted virtual memory.
      
      avc: denied { read } for name="overcommit_memory" dev="proc" ino=10544
      scontext=u:r:wificond:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 29773242
      Change-Id: I78054c1ed576a7998c4ee1d1beca2f610c589c3a
      bc1986fb
  24. Jun 23, 2016
    • Jeff Vander Stoep's avatar
      lmkd: grant read access to all of /sys · 30a3ee4c
      Jeff Vander Stoep authored
      avc: denied { search } for pid=394 comm="lmkd" name="lowmemorykiller" dev="sysfs" ino=7541 scontext=u:r:lmkd:s0 tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=dir permissive=0
      
      Bug: 29558514
      Change-Id: Iaae907a92976af2a9dcb58be5643b8614dcde174
      30a3ee4c
  25. Jun 22, 2016
  26. Jun 21, 2016
    • Alex Deymo's avatar
      Allow update_engine to suspend/resume postinstall. · 108b74a1
      Alex Deymo authored
      update_engine launches the postinstall process and can suspend and
      resume it by sending SIGSTOP and SIGCONT. This fixes the following
      denials:
      
      update_engine: type=1400 audit(0.0:88): avc: denied { sigstop } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      update_engine: type=1400 audit(0.0:89): avc: denied { signal } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      
      Bug: 28959137
      TEST=`update_engine_client --suspend ; update_engine_client --resume` while the device is running postinstall.
      
      Change-Id: I9890ad0ff7fe04bae1a54fa07c61aafca8de8e66
      108b74a1
  27. Jun 20, 2016
    • Felipe Leme's avatar
      Grant access to net_raw and net_admin to dumpstate. · 51fdddaf
      Felipe Leme authored
      These capabilities are required so it can run iptables, otherwise it
      will cause failures such as:
      
      06-20 16:19:02.650  5524  5524 W iptables: type=1400 audit(0.0:232): avc: denied { net_raw } for capability=13 scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=capability permissive=0
      06-20 16:56:57.119  5070  5070 W iptables: type=1400 audit(0.0:13): avc: denied { net_admin } for capability=12 scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=capability permissive=0
      
      BUG: 29455997
      Change-Id: I9c0d1973f166da202d039eac883a6e53d53e24cb
      51fdddaf
  28. Jun 09, 2016
  29. Jun 07, 2016
Loading