Skip to content
Snippets Groups Projects
  1. May 22, 2017
  2. Dec 07, 2016
  3. Dec 06, 2016
    • Nick Kralevich's avatar
      label /bugreports · 87a56541
      Nick Kralevich authored
      /data/bugreports is moving to /bugreports
      
      Bug: 27262109
      Bug: 27204904
      Bug: 32799236
      Test: new symlink is in /bugreports and is labeled correctly
      
      (cherry picked from commit d314376d)
      
      Change-Id: Ia9aca3ff642b2171e9b0ece7c2b420a0d38006cc
      87a56541
  4. Nov 17, 2016
  5. Oct 06, 2016
  6. Sep 27, 2016
  7. Sep 23, 2016
  8. Sep 08, 2016
  9. Sep 07, 2016
  10. Aug 23, 2016
  11. Aug 22, 2016
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · 69fe5d07
      Nick Kralevich authored
      am: c55cf17a
      
      Change-Id: I48f8bbfab4cdd36e6f1555919ff5d032c07af0a2
      69fe5d07
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · 81fb2363
      Eino-Ville Talvala authored
      am: eedacf83
      
      Change-Id: I4b23d564c6a4787180fea2c1530cc78808cbd0d0
      81fb2363
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · c55cf17a
      Nick Kralevich authored
      Apparently some manufacturers sign APKs with the platform key
      which use renderscript. Renderscript works by compiling the
      .so file, and placing it in the app's home directory, where the
      app loads the content.
      
      Drop platform_app from the neverallow restriction to allow partners
      to add rules allowing /data execute for this class of apps.
      
      We should revisit this in the future after we have a better
      solution for apps which use renderscript.
      
      Bug: 29857189
      Change-Id: I058a802ad5eb2a67e657b6d759a3ef4e21cbb8cc
      c55cf17a
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · eedacf83
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      
      (cherry picked from commit c5266df9)
      
      Change-Id: I4adb58e8c8b35122d6295db58cedaa355cdd3924
      eedacf83
  12. Aug 17, 2016
  13. Aug 15, 2016
  14. Aug 13, 2016
    • Andreas Gampe's avatar
      sepolicy: give otapreopt getattr · 88c51465
      Andreas Gampe authored
      Allow the otapreopt rename script to read file attributes. This is
      being used to print the aggregate artifact size for diagnostic
      purposes.
      
      Bug: 30832951
      Change-Id: Iee410adf59dcbb74fa4b49edb27d028025cd8bf9
      88c51465
  15. Aug 10, 2016
    • Alex Deymo's avatar
      Allow executing update_engine_sideload from recovery. · 27f19427
      Alex Deymo authored
      The recovery flow for A/B devices allows to sideload an OTA downloaded
      to a desktop and apply from recovery. This patch allows the "recovery"
      context to perform all the operations required to apply an update as
      update_engine would do in the background. These rules are now extracted
      into a new attributte called update_engine_common shared between
      recovery and update_engine.
      
      Bug: 27178350
      
      (cherry picked from commit d63084d3)
      
      Change-Id: I1f3e1e83a21e37e09b69cd9c497f87b42b9cbeb1
      27f19427
  16. Jul 22, 2016
  17. Jul 20, 2016
  18. Jul 19, 2016
  19. Jul 15, 2016
  20. Jul 14, 2016
  21. Jul 13, 2016
Loading