- Dec 19, 2017
-
-
Jeff Vander Stoep authored
Vendor-specific app domains depend on the rules in app.te so they must reside in public policy. Bug: 70517907 Test: build Change-Id: If45557a5732a06f78c752779a8182e053beb25a2
-
- Dec 18, 2017
-
-
TreeHugger Robot authored
-
- Dec 16, 2017
-
-
yro authored
Test: manual testing conducted see if it interfere's with AOSP Change-Id: If47a663557b2ebf825fc082edb838ae085ec66b3
-
Jiyong Park authored
Merge "/odm is another vendor partition that can be customied by ODMs" am: 5872e84f am: acc88216 am: a212c863 Change-Id: I3e18f18d49133e4fdaf1f266f905620c77eacaf8
-
Jiyong Park authored
am: acc88216 Change-Id: Ia130d8211d9e0b849d5bef6c14a9dc5ecdc0f4ac
-
Jiyong Park authored
am: 5872e84f Change-Id: Ice57a32ba00d99b74ed260706eee7dadae56e91a
-
Jeff Vander Stoep authored
Many processes including third party apps are expected to access /proc/net/xt_qtaguid/stats. Give this file a new label to avoid spamming the logs and temporarily grant read access to all processes. Read-only permission is adequate for all processes based on unix permissions. sailfish:/ # ls -laZ /proc/net/xt_qtaguid/stats -r--r--r-- 1 root net_bw_stats u:object_r:proc_net_xt_qtaguid_stats:s0 stats Bug: 9496886 Bug: 68016944 Bug: 70722355 Test: Build/flash Sailfish. Browse in Chrome and watch videos in youtube. No "denied" or "granted" selinux messages observed in the logs. Change-Id: I29f1ee806c8149988b9b93a950790d14754927ef
-
Treehugger Robot authored
- Dec 15, 2017
-
-
Jiyong Park authored
Since /odm is an extension of /vendor, libs in /odm should be treated just like the ones in /vendor. Bug: 67890517 Test: none as we don't yet have /odm partition. Change-Id: I5232baef769c7fa8c7641b462cfa1d7537d3cfdf
-
- Dec 13, 2017
-
-
Marissa Wall authored
am: 3337c82e Change-Id: Id7dba03c422e4f9a2d094c7b26a773ababe2ab47
-
Marissa Wall authored
am: 5b17322a Change-Id: I6e4c79d36c6b3ed4f734c7a9d6fd24d3031d3ae6
-
Marissa Wall authored
am: 40ed4283 Change-Id: I21488f5a1d0ef9035a3ae165ca790ad18d1b354f
-
Treehugger Robot authored
-
Tom Cherry authored
am: c456286e Change-Id: I73b279fa3f57c321ed39d4b494e413fe2dda900b
-
Tom Cherry authored
am: c878b4c5 Change-Id: I0781ab5eaf7aec47a8657e1c6ef10080c3294463
-
Tom Cherry authored
am: 8b5433a9 Change-Id: I7cf94fdd9aa130b1a97f56d4a97852eae79fa8c7
-
Tom Cherry authored
Allow init to create a serialized property_info file and allow all processes to read it. Bug: 36001741 Test: boot bullhead, walleye using property_info Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
-
- Dec 12, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Marissa Wall authored
Do not let apps read uid_concurrent_active_time and uid_concurrent_policy_time. b/68399339 Test: Check that they can't be read from the shell without root permissions and system_server was able to read them Change-Id: I6f09ef608607cb9f4084ba403a1e7254b8c49a06
-
Tri Vo authored
This will allow bionic cts test to list network interfaces in /sys/class/net. Bug: 70537905 Test: adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests --gtest_filter=ifaddrs.getifaddrs_interfaces Change-Id: Ie07425fc54f9101e911962142824697e64d2bc45
-
Bowgo Tsai authored
am: 5d937ace Change-Id: I98befa88e0e92ffdf86a2c69717f8e9530483d44
-
Bowgo Tsai authored
am: aed99921 Change-Id: I552df075c970f7eeefce33a40661c13837f4959f
-
Bowgo Tsai authored
am: e9ae7735 Change-Id: If44d773ce2ac76861fdb07975c7dfa0d46929a3e
-
Bowgo Tsai authored
/odm partition is the extension of /vendor partition, so we should not use system_file for it. Currently there is no ABI between vendor and odm. We can use 'odm_file' when needed in the future. Bug: 64240127 Test: boot a device Change-Id: I4e8300d597aeeba60a255c8d114a54b24bc39470
- Dec 11, 2017
-
-
Jeff Vander Stoep authored
am: cf4f3a2e Change-Id: I4fc382127fa5c9c3ba14f456383ae44a1de4f28a
-
Jeff Vander Stoep authored
am: f8fe149f Change-Id: I894bf5bcb00ca934b3fd5016e86b1a5910ba7c7f
-