- May 31, 2017
-
-
Neil Fuller authored
Add policy changes to enable a new service. The service is currently switched off in config, but this change is needed before it could be enabled. Bug: 31008728 Test: make droid Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
-
Narayan Kamath authored
am: 6d9f42f0 Change-Id: I1894493c01399348bf0d83679bc119d00acc149e
-
TreeHugger Robot authored
-
Narayan Kamath authored
SEPolicy: Changes for new stack dumping scheme. am: e628cb5b am: 5e8fe834 am: 51a01817 -s ours am: a7d87b94 -s ours Change-Id: I8c2250afc39882dc3ee0b9888e3fb2e1d872cb8a
-
Narayan Kamath authored
am: 51a01817 -s ours Change-Id: I4ecaa2194614148b4b50245e6250bdde02206160
-
Narayan Kamath authored
Applications connect to tombstoned via a unix domain socket and request an open FD to which they can write their traces. This socket has a new label (tombstoned_java_trace_socket) and appdomain and system_server are given permissions to connect and write to it. Apps no longer need permissions to open files under /data/anr/ and these permissions will be withdrawn in a future change. Bug: 32064548 Test: Manual (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709) (cherry picked from commit 11bfcc1e) Change-Id: Icc60d227331c8eee70a9389ff1e7e78772f37e6f
-
Narayan Kamath authored
am: 5e8fe834 Change-Id: Ibfe717b42fc26da2ec7876143b8cf0445a20eaec
-
Narayan Kamath authored
am: e628cb5b Change-Id: If2ce6fbf2b897d58da78430a7bae0fd6fb6e5a49
-
Narayan Kamath authored
Applications connect to tombstoned via a unix domain socket and request an open FD to which they can write their traces. This socket has a new label (tombstoned_java_trace_socket) and appdomain and system_server are given permissions to connect and write to it. Apps no longer need permissions to open files under /data/anr/ and these permissions will be withdrawn in a future change. Bug: 32064548 Test: Manual Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
-
Narayan Kamath authored
-
- May 30, 2017
-
-
Chad Brubaker authored
am: 19e71b7b Change-Id: Ife8931f2543dc6339e16faabef66879c1e184390
-
Chad Brubaker authored
am: d2b3a454 Change-Id: I1ba8e73e1a004b654bc32dd6520b1e41ec3bc9cf
-
Chad Brubaker authored
Bug: 62102558 Test: see b/62102558 Change-Id: If80d1270bcf6835e6d1a78e2176c3e139cebd174
-
Narayan Kamath authored
Applications connect to tombstoned via a unix domain socket and request an open FD to which they can write their traces. This socket has a new label (tombstoned_java_trace_socket) and appdomain and system_server are given permissions to connect and write to it. Apps no longer need permissions to open files under /data/anr/ and these permissions will be withdrawn in a future change. Bug: 32064548 Test: Manual (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709) Change-Id: I70a3e6e230268d12b454e849fa88418082269c4f
-
- May 27, 2017
-
-
Ruchi Kandoi authored
am: cd591483 Change-Id: If3b128bcc0dbeb043f9476c28334d83912ed53e4
-
Ruchi Kandoi authored
am: e95974b0 Change-Id: I29eeb3ec90a67fe4377fe10f0884608a5fa52ea9
-
Ruchi Kandoi authored
am: f23230c8 Change-Id: I2214556e60abce3bf0801bc01d86e8c481e44c38
-
Ruchi Kandoi authored
am: c3f4afef Change-Id: I8810383b62d3c678c289867a0e17732242ee6679
-
Treehugger Robot authored
-
- May 26, 2017
-
-
TreeHugger Robot authored
-
Yifan Hong authored
-
Dan Cashman authored
am: 11b239f0 -s ours Change-Id: Ifabe749bffbc196782476129fdc34bd746f64b47
-
Dan Cashman authored
am: 33d7e90b Change-Id: I72b51db1d65df6a82b396187e982df1e4336c6be
-
TreeHugger Robot authored
* changes: Restrict BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to one dir. Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS
-
Josh Gao authored
This reverts commit a015186f. Bug: http://b/62101480 Change-Id: I8e889e3d50cf1749168acc526f8a8901717feb46
-
- May 25, 2017
-
-
Yifan Hong authored
Test: pass Bug: 62073522 Change-Id: I3d53d0d5ec701c87fb3d45080799f424f7ba3792
-
Ruchi Kandoi authored
SELinux : avc: denied { find } for service=vrmanager pid=2364 uid=1027 scontext=u:r:nfc:s0 tcontext=u:object_r:vr_manager_service:s0 tclass=service_manager permissive=0 Test: manual Bug: 35889571 Change-Id: If95bb5c286def99a0439b36a31b52fa9dfd4a2f4 Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
Jeff Vander Stoep authored
Cutting down on the number of attributes associated with each type speeds up policy lookup times when there is an access vector cache miss. This change cuts down on the number of attributes associate with system_server from 19 to 8. The total number of attributes is reduced from 159 to 64. Bug: 36508258 Test: build and boot Marlin Change-Id: I8cdb6fb783ded869e88c5a9868fd7c8f838190f9
-
Andy Hung authored
-
Sandeep Patil authored
am: 3abc81ce Change-Id: If6350ea61bd6447af7913a7b474e719e0f7707d3
-
Sandeep Patil authored
am: d5a2f3e2 Change-Id: Ie35b0b80c929066186c35d31b8f8d803f374d969
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Dan Cashman authored
These directories were added to allow for partner extensions to the android framework without needing to add changes to the AOSP global sepolicy. There should only ever be one owner of the framework and corresponding updates, so enforce this restriction to prevent accidental accrual of policy in the system image. Bug: 36467375 Test: Add public and private files to policy and verify that they are added to the appropriate policy files. Also test that specifying multiple directories for public or private results in an error. Change-Id: I397ca4e7d6c8233d1aefb2a23e7b44315052678f Merged-In: I397ca4e7d6c8233d1aefb2a23e7b44315052678f (cherry picked from commit 1633da06)
-