Skip to content
Snippets Groups Projects
  1. Apr 02, 2018
  2. Mar 31, 2018
  3. Mar 30, 2018
  4. Mar 29, 2018
  5. Mar 28, 2018
  6. Mar 27, 2018
    • Janis Danisevskis's avatar
      Keystore needs to be able to call apps · a290f576
      Janis Danisevskis authored
      The ConfirmationUI API has a callback interface by which confirmation
      results are presented to the calling app. This requires keystore to call
      into apps.
      
      Test: Device boots and no more denials when call back is delivered to
            apps.
      Bug: 63928580
      Change-Id: Ie23211aeb74c39956c3c3b8b32843d35afa1315a
      a290f576
    • Joel Galenson's avatar
      Use user policy for compatibility tests. · 408584d5
      Joel Galenson authored
      Use the user policy when running the compatibility tests.
      
      Bug: 74344625
      Test: Built policy for many devices.  Booted one device.
      Test: Delete some compat rules, verify error on userdebug.
      Change-Id: Ib2df2dfc06cdf55a839011e9a528e76160a9e436
      (cherry picked from commit c1486218)
      408584d5
  7. Mar 26, 2018
    • Tom Cherry's avatar
      Verify the SELabels used in property_contexts · dc3e1dad
      Tom Cherry authored
      Verify that the SELabels used in property_contexts correspond to a
      real type in the SEPolicy and that this type has the property_type attribute.
      
      Additionally add a check that vendor property_context files do not
      duplicate entries in plat property_contexts, and a similar check that
      odm property_contexts doesn't duplicate either plat or vendor
      property_contexts.
      
      Bug: 74078792
      Test: Build property_contexts on bullhead successfully
      Test: See failure when using a faulty SELabel in property_contexts
      Test: See failure when duplicating label in vendor and plat property_contexts
      Change-Id: I4d2338dab68f1c5a8ed110aa7821f0677f61bafb
      (cherry picked from commit a15df75d)
      dc3e1dad
    • TreeHugger Robot's avatar
      a7c52c5f
    • Jeff Vander Stoep's avatar
      crashdump: cleanup logs · cc0304cf
      Jeff Vander Stoep authored
      Suppress WAI denials from crashdump.
      
      Test: build/flash Taimen. Verify no new denials.
      Bug: 68319037
      Change-Id: If39d057cb020def7afe89fd95e049e45cce2ae16
      cc0304cf
    • TreeHugger Robot's avatar
    • Primiano Tucci's avatar
      perfetto: allow traced to write into FDs received by the client · e9b8bff6
      Primiano Tucci authored
      This allows an optimization that consists in the "perfetto" cmdline
      client passing directly the file descriptor for the output trace
      to traced (as opposite to having traced streaming back the trace
      data to "perfetto" and having that one doing the write() into file).
      This reduces sensibly the memory traffic and CPU overhead of traces
      with a minor change.
      
      Bug: 73625179
      Test: builds + perfetto_integrationtests w/ long_trace.cfg
      Change-Id: I81f5a230338ced20dc543fd91c5a0bd0e58725f2
      Merged-In: I81f5a230338ced20dc543fd91c5a0bd0e58725f2
      (cherry picked from aosp/648831)
      e9b8bff6
  8. Mar 24, 2018
    • Chenbo Feng's avatar
      Allow system server to access bpf fs · 88ef20aa
      Chenbo Feng authored
      The permission to allow system_server to access sys/fs/bpf/ directory
      is missing. Add it back so it can get the bpf maps from the bpf_fs.
      
      Test: device boot and no more denial information of system_server try to
      searcg in fs_bpf
            atest android.net.cts.TrafficStatsTest
      Bug: 75285088
      
      Change-Id: I1040cde6c038eccc4e91c69a10b20aa7a18b19f6
      (cherry picked from aosp commit f83bbd17)
      88ef20aa
  9. Mar 23, 2018
  10. Mar 22, 2018
    • Primiano Tucci's avatar
    • Mikhail Naganov's avatar
      Allow system_server to update timerslack_ns for hal_audio_default · b506a352
      Mikhail Naganov authored
      Based on the following audit message:
      
      type=1400 audit(1521738979.005:385): avc: denied { write } for pid=1269
      comm="Binder:1269_B" name="timerslack_ns" dev="proc" ino=254190
      scontext=u:r:system_server:s0 tcontext=u:r:hal_audio_default:s0
      tclass=file permissive=1
      
      Bug: 74110604
      Test: adb shell dmesg | grep hal_audio_default
      Change-Id: I4c2e787588eb9d223d5e50e1bc8f67876de97c2e
      b506a352
    • Jong Wook Kim's avatar
      Wifi HAL SIOCSIFHWADDR sepolicy · d6d16489
      Jong Wook Kim authored
      Add sepolicy rule to grant Wifi HAL permission to use SIOCSIFHWADDR
      ioctl. This permission is needed to dynamically change MAC address of
      the device.
      
      We are moving the implementation of setting the MAC address from
      WifiCond to Vendor HAL to give vendors flexibility in supporting
      Connected MAC Randomization. Will clean up WifiCond sepolicy afterwards.
      
      Bug: 74347653
      Test: Verified manually
      Change-Id: I334cefddf385ecb1ee169eb692c4e0060c26d6d9
      d6d16489
Loading