- Nov 12, 2016
-
-
Chad Brubaker authored
Fixes: 32061937 Test: install/uninstall and verified no denials Change-Id: I487727b6b32b1a0fb06ce66ed6dd69db43c8d536
-
- Nov 11, 2016
-
-
Nick Kralevich authored
This property is never used. Test: policy compiles Change-Id: I43ace92950e1221754db28548031fbbfc0437d7a
-
Robert Sesek authored
The webview_zygote is a new unprivileged zygote and has its own sockets for listening to fork requests. However the webview_zygote does not run as root (though it does require certain capabilities) and only allows dyntransition to the isolated_app domain. Test: m Test: angler boots Bug: 21643067 Change-Id: I89a72ffe6dcb983c4a44048518efd7efb7ed8e83
-
- Nov 10, 2016
-
-
Jason Monk authored
Allow the system_server to change. Allow the zygote to read it as well. Test: Have system_server set a property Change-Id: Ie90eec8b733fa7193861026a3a6e0fb0ba5d5318
-
- Nov 08, 2016
-
-
Polina Bondarenko authored
Bug: 32022261 Test: manual Change-Id: I664a3b5c37f6a3a36e4e5beb91b384a9599c83f8
-
- Nov 04, 2016
-
-
Etan Cohen authored
Finish NAN -> Aware rename process. Removes old NAN service. Bug: 32263750 Test: device boots and all Wi-Fi unit-tests pass Change-Id: I2f0d9595efea2494b56074752194e7a6e66070f2
-
Etan Cohen authored
Add Aware service - new name for NAN. But do not remove NAN yet. Enables smooth transition. Bug: 32263750 Test: device boots and all Wi-Fi unit-tests pass Change-Id: Ieb9f1ebf1d2f31ee27f228562b4601023da5282d
-
- Nov 03, 2016
-
-
Ruchi Kandoi authored
Bug: 31180823 Test: reduced sepolicy errors Change-Id: Ibfba2efa903adec340e37abec2afb3b94a262678 Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
Ruchi Kandoi authored
Bug: 31177288 Test: reduced sepolicy errors Change-Id: I29556276ee14c341ac8f472875e6b69f903851ff Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
- Nov 01, 2016
-
-
Steven Moreland authored
Bug: 32022100 Test: end to end Change-Id: I5dd9b64c98a5c549fdaf9e47d5a92fa6963370c7
-
Dianne Hackborn authored
Test: N/A Change-Id: Ib3c85118bf752152f5ca75ec13371073fc2873cc
-
Felipe Leme authored
- Allow dumpstate to create the dumpservice service. - Allow System Server and Shell to find that service. - Don't allow anyone else to create that service. - Don't allow anyone else to find that service. BUG: 31636879 Test: manual verification Change-Id: I642fe873560a2b123e6bafde645467d45a5f5711
-
- Oct 28, 2016
-
-
Roshan Pius authored
Renaming the wifi HIDL implementation to 'hal_wifi' from 'wifi_hal_legacy' to conform with HIDL style guide. Denials: 01-01 21:55:23.896 2865 2865 I android.hardware.wifi@1.0-service: wifi_hal_legacy is starting up... 01-01 21:55:23.898 2865 2865 W android.hardware.wifi@1.0-service: /odm/lib64/hw/ does not exit. 01-01 21:55:23.899 2865 2865 F android.hardware.wifi@1.0-service: service.cpp:59] Check failed: service->registerAsService("wifi") == android::NO_ERROR (service->registerAsService("wifi")=-2147483646, android::NO_ERROR=0) Failed to register wifi HAL 01-01 21:55:23.899 2865 2865 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 2865 (android.hardwar) 01-01 21:55:23.901 377 377 W : debuggerd: handling request: pid=2865 uid=2000 gid=2000 tid=2865 01-01 21:55:23.907 2867 2867 E : debuggerd: Unable to connect to activity manager (connect failed: Connection refused) 01-01 21:55:23.908 2867 2867 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 01-01 21:55:23.908 2867 2867 F DEBUG : Build fingerprint: 'Android/aosp_angler/angler:7.0/NYC/rpius10031052:userdebug/test-keys' 01-01 21:55:23.908 2867 2867 F DEBUG : Revision: '0' 01-01 21:55:23.908 2867 2867 F DEBUG : ABI: 'arm64' 01-01 21:55:23.908 2867 2867 F DEBUG : pid: 2865, tid: 2865, name: android.hardwar >>> /system/bin/hw/android.hardware.wifi@1.0-service <<< 01-01 21:55:23.909 2867 2867 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr -------- 01-01 21:55:23.910 2867 2867 F DEBUG : Abort message: 'service.cpp:59] Check failed: service->registerAsService("wifi") == android::NO_ERROR (service->registerAsService("wifi")=-2147483646, android::NO_ERROR=0) Failed to register wifi HAL' Bug: 31821133 Test: Compiled and ensured that the selinux denials are no longer present in logs. Change-Id: I5bbbcad307e9bb9e59fff87e2926751b3aecc813
-
- Oct 26, 2016
-
-
Jeff Vander Stoep authored
Bug: 32123421 Test: build Hikey Change-Id: Iaf02626f3f3a94104c0f9d746c3cf5f20751a27d
-
- Oct 25, 2016
-
-
Connor O'Brien authored
Bug: 31864052 Test: Logging confirms service runs on boot Merged-In: I41e9e5c45d2d42886cdf7ff6d364e9e6e3df1ff4 Change-Id: I41e9e5c45d2d42886cdf7ff6d364e9e6e3df1ff4 Signed-off-by:
Connor O'Brien <connoro@google.com>
-
- Oct 21, 2016
-
-
Mikhail Naganov authored
Change-Id: Iaa9907ed516c947175a59bf49938c0ee03b4f6d1
-
Felipe Leme authored
BUG: 31001899 Test: manual Change-Id: I8d462b40d931310eab26bafa09645ac88f13fc97
-
Craig Donner authored
Test: built and ran on device. Bug: 31442830 Change-Id: Idd7870b4dd70eed8cd4dc55e292be39ff703edd2
-
- Oct 19, 2016
-
-
Prashant Malani authored
Renaming vibrator sepolicy to remove the version number. Also moving the related binder_call() to maintain alphabetical order. Bug: 32123421 Change-Id: I2bfa835085519ed10f61ddf74e7e668dd12bda04 Test: booted, and checked vibrate on keypress on bullhead
-
- Oct 13, 2016
-
-
Prashant Malani authored
Fixes the following denials: avc: denied { open } for pid=7530 comm="android.hardwar" path="/sys/devices/virtual/timed_output/vibrator/enable" dev="sysfs" ino=20519 scontext=u:r:android_hardware_vibrator_1_0_service:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 avc: denied { call } for pid=9173 comm="Binder:7735_C" scontext=u:r:system_server:s0 tcontext=u:r:android_hardware_vibrator_1_0_service:s0 tclass=binder permissive=1 Test: m Bug: 32021191 Change-Id: I243a86b449794e3c2f0abf91ddcf405eff548d0c
-
- Oct 11, 2016
-
-
liminghao authored
N/A Test: builds Change-Id: I10a53c07f5b56c362cc599a901a2d74d7e96e917 Signed-off-by:
liminghao <liminghao@xiaomi.com>
-
- Oct 07, 2016
-
-
Chad Brubaker authored
Test: Builds and boots Change-Id: I3db64e12f0390c6940f5745eae83ce7efa7d65a9
-
- Oct 06, 2016
-
-
dcashman authored
Divide policy into public and private components. This is the first step in splitting the policy creation for platform and non-platform policies. The policy in the public directory will be exported for use in non-platform policy creation. Backwards compatibility with it will be achieved by converting the exported policy into attribute-based policy when included as part of the non-platform policy and a mapping file will be maintained to be included with the platform policy that maps exported attributes of previous versions to the current platform version. Eventually we would like to create a clear interface between the platform and non-platform device components so that the exported policy, and the need for attributes is minimal. For now, almost all types and avrules are left in public. Test: Tested by building policy and running on device. Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
-