- Dec 06, 2017
-
-
Xin Li authored
-
Xin Li authored
Exempt-From-Owner-Approval: Changes already landed internally Change-Id: I11a15296360fd68485402e33814e7e756925c6a8
-
Treehugger Robot authored
-
Josh Gao authored
Bug: http://b/63989615 Test: mma Change-Id: I41506ecb0400867230502181c1aad7e51ce16d70
-
Treehugger Robot authored
-
Andreas Gampe authored
Until simpleperf does not optimistically try /data/local/tmp for tmp storage, silence the denials. Bug: 70232908 Test: m Test: manual Change-Id: Icbc230dbfbfa6493b4e494185c536a10e3b0ae7b
-
Tri Vo authored
Add write access to: sysfs_android_usb sysfs_leds sysfs_power sysfs_zram Add setattr access to: sysfs_android_usb sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_power sysfs_leds sysfs_ipv4 Bug: 70040773 Bug: 65643247 Change-Id: I68e2e796f5599c9d281897759c8d8eef9363559a Test: walleye boots with no denials from init to sysfs.
-
kaichieh authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: I53a9715b2f9ddccd214f4cf9ef081ac426721612
-
- Dec 05, 2017
-
-
Jason Monk authored
am: 07131ec8 Change-Id: Id52c9d602fd05e07d79b39b78c164015eab888b0
-
Jaegeuk Kim authored
am: c8e7a9f4 Change-Id: Ib7ea2f91d6a2099f76c0124097db2f389da9b95e
-
Jason Monk authored
Test: make/sync Bug: 68751119 Change-Id: Ie3c60ff68b563cef07f20d15f298d6b62e9356bc
-
Jaegeuk Kim authored
This allows to format sdcard for adoptable storage. Bug: 69641635 Change-Id: I8d471be657e2e8f4df56c94437239510ca65096e Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- Dec 04, 2017
-
-
rickywai authored
- Dec 02, 2017
-
-
Andreas Gampe authored
am: 99e4f402 Change-Id: I80eaf2eb1867d99137c1c7afd1708ebaf6a60e35
-
Andreas Gampe authored
Corresponds to commit 410cdebaf966746d6667d6d0dd4cee62262905e1 in system/extras. Bug: 32286026 Test: m Change-Id: I1e0934aa5bf4649d598ec460128de6f02711597f
-
- Dec 01, 2017
-
-
Tri Vo authored
Add write access to: sysfs_android_usb sysfs_leds sysfs_power sysfs_zram Add setattr access to: sysfs_android_usb sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_power sysfs_leds sysfs_ipv4 Bug: 65643247 Test: walleye boots with no denials from init to sysfs. Change-Id: Ibc9a54a5f43f3d53ab7cbb0fdb9589959b31ebde
-
Joel Galenson authored
am: cea60d7e Change-Id: I9c0195571c616525fe8daaefc76661d111a57917
-
Treehugger Robot authored
- Nov 30, 2017
-
-
Joel Galenson authored
Now that creating a symlink automatically sets its context, init needs permission to create this file. Bug: 69965807 Test: Booted device and tested wifi and camera. Change-Id: I41f5ca8f4d877312c9b2a909001fe9cd80c3d458
-
Calin Juravle authored
am: acbda504 Change-Id: I9575610aeae0464661ad23d0eac696915cb0064e
-
Ricky Wai authored
Bug: 63908748 Test: built, flashed, able to boot Change-Id: I3cfead1d687112b5f8cd485c8f84083c566fbce2
-
Calin Juravle authored
This is needed in order to get the stat-size of the files. Bug: 30934496 Test: gts-tradefed -m GtsAndroidRuntimeManagerHostTestCases Change-Id: I1df0ba941e8f9ff13a23df4063acc3c4f1555c1b
-
Connor O'Brien authored
am: 33ba9c54 Change-Id: I09d49857f0bffc37090c4429879fb5288cbc9b90
-
Connor O'Brien authored
-
Jeff Vander Stoep authored
am: f838a3bc Change-Id: Ia2c73bd7b5524da7df7aa96c14dd60e30feecce2
-
Treehugger Robot authored
-
- Nov 29, 2017
-
-
Jeff Vander Stoep authored
Tclass was omitted for two entries. Bug: 69928154 Bug: 69366875 Test: build Change-Id: Ie12c240b84e365110516bcd786b98dc37295fdb9
-
Connor O'Brien authored
/proc/uid/ provides the same per-uid time_in_state data as /proc/uid_time_in_state, so apply the same type and let system_server read directories of this type. Bug: 66953705 Test: system_server can read /proc/uid/*/time_in_state files without denials on sailfish Change-Id: Iab7fd018c5296e8c0140be81c14e5bae9e0acb0b Signed-off-by:
Connor O'Brien <connoro@google.com>
-
Nicholas Sauer authored
am: 4ebbe461 -s ours Change-Id: I72f7b323551fc2151668203db725710231c836c5
-
Nicholas Sauer authored
-
- Nov 28, 2017
-
-
Calin Juravle authored
am: 15da30b6 Change-Id: I6a06b84d6319680d73d38ec16ca6e142d79290d1
-
Nicholas Sauer authored
bug: 69430536 Test: make ats-tradefed && ats-tradefed run ats -m GtsSecurityHostTestCases Merged-In: I617a7d08b1bf480f970bc8b4339fa6bbdc347311 Change-Id: I1d4af47662de5db4e5f7bba244e42930b6de164b
-
Calin Juravle authored
Allow system_server to open profile snapshots for read. System server never reads the actual content. It passes the descriptor to to privileged apps which acquire the permissions to inspect the profiles. Test: installd_dexopt_test Bug: 30934496 Change-Id: I1d1f07a05261af25f6640040af1500c9a4d5b8d5
-