Skip to content
Snippets Groups Projects
  1. Mar 30, 2018
  2. Mar 29, 2018
  3. Mar 28, 2018
  4. Mar 27, 2018
    • Tri Vo's avatar
      Fix aosp healthd. · dd7d5a70
      Tri Vo authored
      We only need this change for aosp devices. Internal sepolicy for healthd
      domain is different and does not need this.
      
      Addresses this denial:
      avc: denied { open } for path="/sys/class/power_supply" dev="sysfs"
      ino=25340 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0
      tclass=dir permissive=1
      
      Test: $OUT/vendor/etc/selinux/precompiled_sepolicy contains the new
      permission.
      Change-Id: Ie47c231af800026fd9d8a1f752253bb338768c13
      dd7d5a70
    • Janis Danisevskis's avatar
      Keystore needs to be able to call apps · 3de9cd95
      Janis Danisevskis authored
      The ConfirmationUI API has a callback interface by which confirmation
      results are presented to the calling app. This requires keystore to call
      into apps.
      
      Test: Device boots and no more denials when call back is delivered to
            apps.
      Bug: 63928580
      Change-Id: Ie23211aeb74c39956c3c3b8b32843d35afa1315a
      3de9cd95
    • Andreas Gampe's avatar
      Statsd: Allow statsd to contact perfprofd in userdebug · 488030ee
      Andreas Gampe authored
      Give statsd rights to connect to perfprofd in userdebug.
      
      Test: mmma system/extras/perfprofd
      Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
      488030ee
    • Treehugger Robot's avatar
      f81c1227
    • Jaekyun Seok's avatar
      Allow vendor-init-settable to persist.radio.multisim.config · ac8c6e3d
      Jaekyun Seok authored
      A default value of persist.radio.multisim.config can be set by SoC
      vendors, and so vendor-init-settable should be allowed to it.
      
      Bug: 73871799
      Test: succeeded building and tested with taimen
      Change-Id: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4
      ac8c6e3d
    • Treehugger Robot's avatar
      Merge "crashdump: cleanup logs" · 391462d1
      Treehugger Robot authored
      391462d1
    • Joel Galenson's avatar
      Use user policy for compatibility tests. · c1486218
      Joel Galenson authored
      Use the user policy when running the compatibility tests.
      
      Bug: 74344625
      Test: Built policy for many devices.  Booted one device.
      Test: Delete some compat rules, verify error on userdebug.
      Change-Id: Ib2df2dfc06cdf55a839011e9a528e76160a9e436
      c1486218
  5. Mar 26, 2018
    • Tom Cherry's avatar
      a8b42c97
    • Jeff Vander Stoep's avatar
      crashdump: cleanup logs · 627ba82b
      Jeff Vander Stoep authored
      Suppress WAI denials from crashdump.
      
      Test: build/flash Taimen. Verify no new denials.
      Bug: 68319037
      Change-Id: If39d057cb020def7afe89fd95e049e45cce2ae16
      (cherry picked from commit cc0304cf)
      627ba82b
    • Treehugger Robot's avatar
    • Tom Cherry's avatar
      Verify the SELabels used in property_contexts · a15df75d
      Tom Cherry authored
      Verify that the SELabels used in property_contexts correspond to a
      real type in the SEPolicy and that this type has the property_type attribute.
      
      Additionally add a check that vendor property_context files do not
      duplicate entries in plat property_contexts, and a similar check that
      odm property_contexts doesn't duplicate either plat or vendor
      property_contexts.
      
      Bug: 74078792
      Test: Build property_contexts on bullhead successfully
      Test: See failure when using a faulty SELabel in property_contexts
      Test: See failure when duplicating label in vendor and plat property_contexts
      Change-Id: I4d2338dab68f1c5a8ed110aa7821f0677f61bafb
      a15df75d
    • Primiano Tucci's avatar
      Revert "Allow system server to set persist.traced.enable" · 4f673cf4
      Primiano Tucci authored
      This reverts commit 6f2040f8.
      
      Reason for revert: not needed anymore after ag/3773705
      This was meant to allow system_server toggling the property on/off.
      Later we realized that we needed a separate property for that 
      (see discussion in b/76077784) and system server happens to
      have already permissions to write to sys.* properties even without
      this CL.
      Reverting because at this point this creates just unnecessary clutter.
      
      Change-Id: Ia73d000aad3c4288a5652047dfe10896e231b0b1
      Test: perfetto_integrationtests
      Bug: 76077784
      4f673cf4
    • Primiano Tucci's avatar
      perfetto: allow traced to write into FDs received by the client · 5d317326
      Primiano Tucci authored
      This allows an optimization that consists in the "perfetto" cmdline
      client passing directly the file descriptor for the output trace
      to traced (as opposite to having traced streaming back the trace
      data to "perfetto" and having that one doing the write() into file).
      This reduces sensibly the memory traffic and CPU overhead of traces
      with a minor change.
      
      Bug: 73625179
      Test: builds + perfetto_integrationtests w/ long_trace.cfg
      Change-Id: I81f5a230338ced20dc543fd91c5a0bd0e58725f2
      5d317326
  6. Mar 24, 2018
  7. Mar 23, 2018
Loading