- Dec 18, 2017
-
-
xshu authored
we are aiming to improve logging performance by having wifi hal directly write to the flash. Wifi hal need to be able to create, write, and delete files in a directory. This will be restricted to userdebug and eng builds only. Bug: 70170285 Test: compile, run on device Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
-
- Dec 16, 2017
-
-
yro authored
Test: manual testing conducted see if it interfere's with AOSP Change-Id: If47a663557b2ebf825fc082edb838ae085ec66b3
-
Treehugger Robot authored
- Dec 15, 2017
-
-
Jiyong Park authored
Since /odm is an extension of /vendor, libs in /odm should be treated just like the ones in /vendor. Bug: 67890517 Test: none as we don't yet have /odm partition. Change-Id: I5232baef769c7fa8c7641b462cfa1d7537d3cfdf
-
- Dec 13, 2017
-
-
Treehugger Robot authored
-
Tom Cherry authored
Allow init to create a serialized property_info file and allow all processes to read it. Bug: 36001741 Test: boot bullhead, walleye using property_info Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
-
- Dec 12, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Marissa Wall authored
Do not let apps read uid_concurrent_active_time and uid_concurrent_policy_time. b/68399339 Test: Check that they can't be read from the shell without root permissions and system_server was able to read them Change-Id: I6f09ef608607cb9f4084ba403a1e7254b8c49a06
-
Tri Vo authored
This will allow bionic cts test to list network interfaces in /sys/class/net. Bug: 70537905 Test: adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests --gtest_filter=ifaddrs.getifaddrs_interfaces Change-Id: Ie07425fc54f9101e911962142824697e64d2bc45
-
Bowgo Tsai authored
/odm partition is the extension of /vendor partition, so we should not use system_file for it. Currently there is no ABI between vendor and odm. We can use 'odm_file' when needed in the future. Bug: 64240127 Test: boot a device Change-Id: I4e8300d597aeeba60a255c8d114a54b24bc39470
-
- Dec 11, 2017
-
-
Jeff Vander Stoep authored
Commit b8b4f5d6 'Clean up old file-based OTA SELinux rules' removed many permissions from recovery, a few of which are still required. Restore these. [ 2918.409108] type=1400 audit(2327427.540:159): avc: denied { search } for pid=339 comm="recovery" name="/" dev="mmcblk0p38" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 [ 2586.563071] E:Failed to mount / create /cache/recovery: Permission denied [ 2586.780320] E:Can't open /cache/recovery/log: Permission denied [ 2586.850399] E:Can't open /cache/recovery/last_log: Permission denied [ 2586.918979] E:Can't open /cache/recovery/last_install: Permission denied [ 54.035867] type=1400 audit(59206654.526:12): avc: denied { chown } for pid=330 comm="recovery" capability=0 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=0a Bug: 70350029 Test: xunchang to test Change-Id: I46ab049b8eb600b44c84a61777fade150cadd197
-
Tri Vo authored
We rely on vendors to label all dependencies of healthd/charger under /sys/class/power_supply with sysfs_batteryinfo type. Bug: 65643247 Bug: 32659667 Test: boots without denials from healthd, to sysfs_batteryinfo or to sysfs_msm_subsys. Test: charging with device turned off works without /sys denials. Change-Id: I893f309ecad8a0caf7d0b81f5f945725907255c2
-
- Dec 09, 2017
-
-
Tri Vo authored
-
Treehugger Robot authored
-
Tri Vo authored
We already expect contents of /sys/class/net to be labeled as sysfs_net. Also label the directory for consistensy since we usually label /sys/class/foo directories as sysfs_foo. Bug: 65643247 Test: netd_integration_test Test: can browse internet without denials to sysfs_net Change-Id: I9d28ab4baf71df99ae966276532f14684d1abca6
-
- Dec 08, 2017
-
-
Treehugger Robot authored
-
Andreas Gampe authored
Follow along with updates in the selinux policy. Test: m Test: manual Change-Id: I0dfc6af8fbfc9c8b6860490ab16f02a220d41915
-
Jaegeuk Kim authored
Change-Id: Icfcf02a21dace99ab3f466de495db24a88127ad7 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- Dec 07, 2017
-
-
Tomasz Wasilczyk authored
Test: VTS Bug: 69958777 Change-Id: I6db7dd9afc9c7f254a0233ff3144b02e48727038
-
Elliott Hughes authored
Bug: http://b/63142920 Test: `make dist` Change-Id: Iae363fd5e7181941408d3d75cbf248e651bc8b49
-
Treehugger Robot authored
-
Dan Cashman authored
Bug: 65551293 Bug: 69390067 Test: None. Prebuilt only change. Change-Id: Ie793eb4a35927cb494281df59ae0a63666bb6e76
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Bo Hu authored
This reverts commit 8b562206. Reason for revert: broke mac build b/70273082 FAILED: out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil /bin/bash -c "(out/host/darwin-x86/bin/version_policy -b out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil -t out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil -n 10000.0 -o out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp ) && (grep -Fxv -f out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp > out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil ) && (out/host/darwin-x86/bin/secilc -m -M true -G -N -c 30 out/target/product/generic_x86/obj/ETC/plat_sepolicy.cil_intermediates/plat_sepolicy.cil out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/10000.0.cil_intermediates/10000.0.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil -o /dev/null -f /dev/null )" Parsing out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil Parsing out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil grep: out of memory Change-Id: I14f0801fdd6b9be28e53dfcc0f352b844005db59
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Dec 06, 2017
-
-
Xin Li authored
-
Xin Li authored
Exempt-From-Owner-Approval: Changes already landed internally Change-Id: I11a15296360fd68485402e33814e7e756925c6a8
-
Andreas Gampe authored
Simpleperf reads kernel notes. Bug: 70275668 Test: m Test: manual Change-Id: I1a2403c959464586bd52f0398ece0f02e3980fc4
-
Andreas Gampe authored
Label /sys/kernel/notes. Bug: 70275668 Test: m Change-Id: Ieb666425d2db13f85225fb902fe06b0bf2335bef
-
Treehugger Robot authored
-
Josh Gao authored
Bug: http://b/63989615 Test: mma Change-Id: I41506ecb0400867230502181c1aad7e51ce16d70
-
Treehugger Robot authored
-
Andreas Gampe authored
Until simpleperf does not optimistically try /data/local/tmp for tmp storage, silence the denials. Bug: 70232908 Test: m Test: manual Change-Id: Icbc230dbfbfa6493b4e494185c536a10e3b0ae7b
-
Dan Cashman authored
Bug: 65551293 Bug: 69390067 Test: None. Prebuilt only change. Change-Id: I62304b342a8b52fd505892cc2d4ebc882148224b
-
Tri Vo authored
Add write access to: sysfs_android_usb sysfs_leds sysfs_power sysfs_zram Add setattr access to: sysfs_android_usb sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_power sysfs_leds sysfs_ipv4 Bug: 70040773 Bug: 65643247 Change-Id: I68e2e796f5599c9d281897759c8d8eef9363559a Test: walleye boots with no denials from init to sysfs.
-