- Jun 15, 2017
-
-
TreeHugger Robot authored
-
Dan Cashman authored
ASAN makes use of shenanigans that violate our policy best-practices. This is by design. Exempt them from these tests to get it building again. Bug: 37740897 Test: Builds with ASAN enabled. Change-Id: Iffde28c2741466da5862b2dfe1fffa2c0d93caeb
-
Tom Cherry authored
am: c6382177 Change-Id: I88f49a55da787aa355431b65cbada05924d2c152
-
Tom Cherry authored
am: 24d0cad3 Change-Id: Ieffac9d2e5ff8500534cf9935eff9918989c2fb4
-
Tom Cherry authored
am: 04306859 Change-Id: I3eb542cced980ce94425110d8dc8e58aeb122607
-
Tom Cherry authored
am: 2122f1fe Change-Id: I05f0b28b9e6622477fe2fa4b041ea03c5744f82c
-
Tom Cherry authored
-
TreeHugger Robot authored
-
- Jun 14, 2017
-
-
Carmen Jackson authored
Merge "Add debug selinux permission to write saved_cmdlines_size. am: e9381d5e am: d651e0b7" into oc-dr1-dev-plus-aosp am: 1c21d4bf -s ours Change-Id: I61071789474228aa6cc0f59b9ecfb9a859f0ae48
-
Carmen Jackson authored
am: 7683d565 -s ours Change-Id: I47c3530675ce5c55edc09bca749c7a897404d033
-
Android Build Merger (Role) authored
Merge "Add debug selinux permission to write saved_cmdlines_size. am: e9381d5e am: d651e0b7" into oc-dr1-dev-plus-aosp
-
Carmen Jackson authored
am: e180a613 Change-Id: Iaa5b2f434ebf712884d5823caf87e93de317e14e
-
Carmen Jackson authored
am: d651e0b7 Change-Id: I99c911d119c300e7035a111a24b0d900f435fca8
-
Carmen Jackson authored
am: e9381d5e Change-Id: I784011fc804dd43f431be62804761b100846dfbf
-
Carmen Jackson authored
am: e9381d5e Change-Id: Ic2192d5128543f28d2f91c4aedabab08b01669e5
-
Joel Galenson authored
One of my previous commits removed this, so I am now restoring it. This commit also contains a bit of cleanup from previous commits by removing some unneeded types. It also fixes traceur by porting ag/2409144 to master. Bug: 62413700, 62547086 Test: Built, flashed, and booted Marlin. Verified that the files have the correct context. Verified that atrace and traceur work. Change-Id: I76fa0e9060aff554687d57ab3976c8704a4068f0
-
TreeHugger Robot authored
-
Carmen Jackson authored
Now that we're expected to use this when taking traces, we need to add this permission so that Traceur can also access this file. Test: Used Traceur and saw the traces appear in the bugreports directory, as expected. Bug: 62493544 Change-Id: Ib4304176abbb51e2e3b45c566ff14574e1cfaa82 Merged-In: I464b0df30fabfc5f1c7cd7430e53e8d04bfacb53 (this merged-in is not the same change; it's a conflicting change in master)
-
Jeff Vander Stoep authored
avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: granted { getattr } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir Fixes: 62619253 Test: policy builds, no more "granted" messages in dmesg for recovery. Change-Id: I3f6d8ceee80307a01a8fd40cb4f8362a9825b1a3
-
TreeHugger Robot authored
-
Robert Benea authored
-
Joel Scherpelz authored
am: 733609da Change-Id: I248cfa3b85774569123a3b3f7e8d3c068005b7fc
-
Joel Scherpelz authored
am: 14a3cb28 Change-Id: Ib3b7dc9a8a702a32330ccb31f22cf746df8764fb
-
Joel Scherpelz authored
am: 5ee87b00 Change-Id: Id2dc995f88a60fe865387453234e3630a9975381
-
Joel Scherpelz authored
am: abb1ba65 Change-Id: I7765bfd350deb50847e83a1d3b5d7399206b4b9d
-
Tim Murray authored
Allow lmkd to access /dev/memcg once again. Test: lmkd can access memcg bug 36588803 Change-Id: I47b4e79260bcd2967d85d8151c83e624d432f409
-
Robert Benea authored
-
Robert Benea authored
This reverts commit 527f64e6. Change-Id: Ibc48af53431a8f7c7211999dcb571f492fb5ddb4
-
- Jun 13, 2017
-
-
Jeff Vander Stoep authored
Test that: - File types on /sys have attr sysfs_type - File types on /sys/kernel/debug have attr debugfs_type - File types on /data have attr data_file_type Test: build policy Change-Id: Ie4f1f1c7e5345da0999082962f084fdac6b85428
-
TreeHugger Robot authored
-
Tom Cherry authored
In libprocessgroup, we want to only send signals once to processes, particularly for SIGTERM. We must send the signal both to all processes within a POSIX process group and a cgroup. To ensure that we do not duplicate the signals being sent, we check the processes in the cgroup to see if they're in the POSIX process groups that we're killing. If they are, we skip sending a second signal. This requires getpgid permissions, hence this SELinux change. avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 Bug: 37853905 Bug: 62418791 Test: Boot, kill zygote, reboot Change-Id: Ib6c265dbaac8833c47145ae28fb6594ca8545570
-
Jeff Vander Stoep authored
am: b3bdba4d Change-Id: I4d3a71a1ffd2004e3ac85d89686d24e00c112d6e
-
Jeff Vander Stoep authored
am: 78c58c79 Change-Id: I93ab700661ddad141f2ff9973187bb5b72ffad78
-
Jeff Vander Stoep authored
am: 5c383688 Change-Id: Iaf28a1b178427e5b2bd13f45485cc3504464f6fc
-
Jeff Vander Stoep authored
am: 77fe1de7 Change-Id: I71b4bca350a9a29dd45dfafe8c3d1938cb54a46f
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I87eb8bad11fc9c011289b8d97219835a08d18cd1
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I60a92781a5b923889e627d73e8922aca2607b67b
-
Daniel Cashman authored
-
Jeff Vander Stoep authored
[ 7.674739] selinux: selinux_android_file_context: Error getting file context handle (No such file or directory) Bug: 62564629 Test: build and flash marlin. Successfully switch between regular and recovery modes Change-Id: I0f871f8842d95322c844fb7b13ad1b4b42578e35
-
Dan Cashman authored
commit: 5c6a227e added the oc-dev sepolicy prebuilts (api 26.0), but did not include the corresponding base mapping file, which is to be maintained along with current platform development in order to ensure backwards compatibility. Bug: 37896931 Test: none, this just copies the old mapping file to prebuilts. Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
-