Skip to content
Snippets Groups Projects
  1. Jul 07, 2017
    • Dan Cashman's avatar
      Record hal_tetheroffload_service for compatibility. · 4d9f41d7
      Dan Cashman authored
      Commit: e58a8de5 added a new type
      which has no analogue in 26.0.  Record it as such.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I6b6d2aa64e0ac2c39c8d0427d333e6c7fc2b0bb1
      4d9f41d7
    • Dan Cashman's avatar
      Record memcg_device type for compat. · d0900526
      Dan Cashman authored
      Commit: 86cb5215 gave /dev/memcg a
      new label, but also explicitly prohibited access to vendor domains.
      Add the type to the 'new types' and don't map it to any other type
      for backwards compatibility.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I8902716830b162ead69834544ace9e02a94c65b4
      d0900526
    • Dan Cashman's avatar
      Record new broadcast_service type. · 255a4a72
      Dan Cashman authored
      Commit: 38f0928f added a type for a
      new system service.  This service did not exist previously, so mark
      the type as not needing any compat entry.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I52d8e144c614b27f5c52fa99be6cfac87159bbcd
      255a4a72
    • Dan Cashman's avatar
      Record new cas hwservice type. · 629c58b2
      Dan Cashman authored
      Commit: 78e595de added a new hwservice,
      which replaced a previous system service.  This effectively means we are
      deleting one object and creating a new one, so no compatibility mapping
      should be necessary since previous vendor processes trying to access the
      service will not be able to find it now independent of policy.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I6882d968dccb55561379e940f6ecb62902bb1659
      629c58b2
    • TreeHugger Robot's avatar
      55969ec7
  2. Jul 06, 2017
  3. Jul 05, 2017
    • Jeff Vander Stoep's avatar
      Preserve attributes needed for CTS · 5f5aa962
      Jeff Vander Stoep authored
      Change fb889f23 "Force expand all hal_* attributes" annotated all
      hal_* attributes to be expanded to their associated types. However
      some of these attributes are used in CTS for neverallow checking.
      Mark these attributes to be preserved.
      
      In addition, remove the hacky workaround introduced in oc-dev
      for b/62658302 where extraneous neverallow rules were introduced
      to prevent unused or negated attributes from being auto-expanded
      from policy.
      
      Bug: 62658302
      Bug: 63135903
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \
          android.cts.security.SELinuxNeverallowRulesTest
      
          armeabi-v7a CtsSecurityHostTestCases completed in 4s.
          501 passed, 0 failed, 0 not executed
      Merged-In: I989def70a16f66e7a18bef1191510793fbe9cb8c
      Change-Id: I989def70a16f66e7a18bef1191510793fbe9cb8c
      5f5aa962
Loading