Skip to content
Snippets Groups Projects
  1. Jul 11, 2016
    • Andreas Gampe's avatar
      Sepolicy: Add otapreopt_slot · eb717421
      Andreas Gampe authored
      The new A/B OTA artifact naming scheme includes the target slot so
      that the system is robust with respect to unexpected reboots. This
      complicates the renaming code after reboot, so it is moved from the
      zygote into a simple script (otapreopt_slot) that is hooked into
      the startup sequence in init.
      
      Give the script the subset of the rights that the zygote had so that
      it can move the artifacts from /data/ota into /data/dalvik-cache.
      Relabeling will be done in the init rc component, so relabeling
      rights can be completely removed.
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: Iad56dc3d78ac759f4f2cce65633cdaf1cab7631b
      eb717421
    • Andreas Gampe's avatar
      Sepolicy: Adapt for new A/B OTA flow · d47c1e93
      Andreas Gampe authored
      To include target slot names in the naming of A/B OTA artifacts,
      and new path has been implemented. Instead of passing through
      the system server and forking off of installd, otapreopt_chroot
      is now driven directly from the otapreopt script.
      
      Change the selinux policy accordingly: allow a transition from
      postinstall to otapreopt_chroot, and let otapreopt_chroot inherit
      the file descriptors that update_engine had opened (it will close
      them immediately, do not give rights to the downstream executables
      otapreopt and dex2oat).
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: I6b476183572c85e75eda4d52f60e4eb5d8f48dbb
      d47c1e93
  2. Jul 07, 2016
  3. Jul 06, 2016
  4. Jun 29, 2016
  5. Jun 28, 2016
  6. Jun 27, 2016
  7. Jun 25, 2016
  8. Jun 24, 2016
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · c5266df9
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      Change-Id: Ia876cc1dfd5b12908c59bd9e8620a6b890729c28
      c5266df9
  9. Jun 23, 2016
  10. Jun 22, 2016
    • Tao Bao's avatar
    • Tao Bao's avatar
      update_verifier: Allow searching /dev/block. · 6a9c4d4c
      Tao Bao authored
      update_verifier calls bootcontrol HAL to mark the currently booting slot
      as successfully booted.
      
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      
      Bug: 29569601
      Test: Marlin boots up with no update_verifier denials and 'bootctl is-slot-marked-successful 0' returns 0.
      Change-Id: I1baa7819bc829e3c4b83d7168008a5b06b01cc9f
      6a9c4d4c
    • Felipe Leme's avatar
      Grant access to net_raw and net_admin to dumpstate. · 3286c675
      Felipe Leme authored
      am: 42aaf5a0
      
      Change-Id: I225056d3febfa71be4c425bf4283cc0d7f356c7d
      3286c675
    • David Brazdil's avatar
    • Alex Deymo's avatar
      Allow update_engine to suspend/resume postinstall. · 9640bcfa
      Alex Deymo authored
      update_engine launches the postinstall process and can suspend and
      resume it by sending SIGSTOP and SIGCONT. This fixes the following
      denials:
      
      update_engine: type=1400 audit(0.0:88): avc: denied { sigstop } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      update_engine: type=1400 audit(0.0:89): avc: denied { signal } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      
      Bug: 28959137
      TEST=`update_engine_client --suspend ; update_engine_client --resume` while the device is running postinstall.
      
      (cherry picked from commit 108b74a1)
      
      Change-Id: Iec8e10fe0cfda5c0764d2e5ad90ea1c6dd13dab2
      9640bcfa
  11. Jun 21, 2016
  12. Jun 20, 2016
  13. Jun 17, 2016
  14. Jun 16, 2016
  15. Jun 15, 2016
    • Amith Yamasani's avatar
      Allow installd to delete the foreign-dex folder · a4e2aa13
      Amith Yamasani authored
      Grant installd the policies to recursively delete
      the foreign-dex folder when removing a user. Otherwise
      the user cleanup will partially fail and cause a boot loop
      when the userId is reused as some later point.
      
      Bug: 29285673
      Change-Id: I023f150cffbeb10b6014f48bca9eb0922c2d630a
      a4e2aa13
  16. Jun 14, 2016
    • dcashman's avatar
      Keep pre-existing sysfs write permissions. · 17cfd3fc
      dcashman authored
      Commit: b144ebab added the sysfs_usb
      type and granted the read perms globally, but did not add write
      permissions for all domains that previously had them.  Add the ability
      to write to sysfs_usb for all domains that had the ability to write to
      those files previously (sysfs).
      
      Address denials such as:
      type=1400 audit(1904.070:4): avc:  denied  { write } for  pid=321 comm="ueventd" name="uevent" dev="sysfs" ino=1742 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_usb:s0 tclass=file permissive=0
      
      Bug: 28417852
      Change-Id: I4562ea73f2158ebefba74b58ca572f2176d1b849
      17cfd3fc
    • Nick Kralevich's avatar
      Add SIOCGSTAMP SIOCGSTAMPNS to unpriv_sock_ioctls · 30eddd7f
      Nick Kralevich authored
      am: 92e79e22
      
      Change-Id: I120a8a0a73ec37adee5771f7ffcc7be695b4c141
      30eddd7f
    • Nick Kralevich's avatar
      Add SIOCGSTAMP SIOCGSTAMPNS to unpriv_sock_ioctls · 92e79e22
      Nick Kralevich authored
      Per "man socket":
      
        SIOCGSTAMP
        Return a struct timeval with the receive timestamp of the last packet
        passed to the user. This is useful for accurate round trip time
        measurements. See setitimer(2) for a description of struct timeval.
        This ioctl should only be used if the socket option SO_TIMESTAMP is
        not set on the socket. Otherwise, it returns the timestamp of the last
        packet that was received while SO_TIMESTAMP was not set, or it fails
        if no such packet has been received, (i.e., ioctl(2) returns -1 with
        errno set to ENOENT).
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=6E6574776F726B5F74687265616420
      path="socket:[42934]" dev="sockfs" ino=42934 ioctlcmd=8906
      scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:r:untrusted_app:s0:c512,c768 tclass=udp_socket permissive=0
      
      Bug: 29333189
      Change-Id: I916a695fa362cf1cf6759629c7f6101e9f657e7d
      92e79e22
  17. Jun 13, 2016
  18. Jun 10, 2016
    • Marco Nelissen's avatar
      reduce mediaserver permissions · b590d49b
      Marco Nelissen authored
      am: f8f4d3e1
      
      Change-Id: If2975c226b86c11595f5c41a964783f7e9caa171
      b590d49b
    • Marco Nelissen's avatar
      reduce mediaserver permissions · f8f4d3e1
      Marco Nelissen authored
      It no longer needs access to audio and camera
      
      Bug: 22775369
      Change-Id: I1de1f0e3504b214d6943733bf60eb83654b71048
      f8f4d3e1
    • dcashman's avatar
      Allow access to sysfs usb nodes. · b144ebab
      dcashman authored
      Some legitimate functionality currently requires direct sysfs access
      that is not otherwise possible via the android APIs.  Specifically,
      isochronous USB transfers require this direct access, without which USB
      audio applications would noticibly suffer.
      
      Grant read access to the usb files under /sys/devices to prevent this
      regression.
      
      Bug: 28417852
      Change-Id: I3424bf3498ffa0eb647a54cc962ab8c54f291728
      b144ebab
  19. Jun 09, 2016
Loading