Skip to content
Snippets Groups Projects
  1. Nov 29, 2017
  2. Nov 28, 2017
    • Calin Juravle's avatar
      Allow system server to open profiles · 8e4bedd4
      Calin Juravle authored
      am: 15da30b6
      
      Change-Id: I6a06b84d6319680d73d38ec16ca6e142d79290d1
      8e4bedd4
    • Nicholas Sauer's avatar
      Make sepolicy-analyze for ATS. · b6d6db27
      Nicholas Sauer authored
      bug: 69430536
      Test: make ats-tradefed && ats-tradefed run ats -m
      GtsSecurityHostTestCases
      
      Merged-In: I617a7d08b1bf480f970bc8b4339fa6bbdc347311
      Change-Id: I1d4af47662de5db4e5f7bba244e42930b6de164b
      b6d6db27
    • Calin Juravle's avatar
      Allow system server to open profiles · 15da30b6
      Calin Juravle authored
      Allow system_server to open profile snapshots for read.
      System server never reads the actual content. It passes the descriptor to
      to privileged apps which acquire the permissions to inspect the profiles.
      
      Test: installd_dexopt_test
      Bug: 30934496
      Change-Id: I1d1f07a05261af25f6640040af1500c9a4d5b8d5
      15da30b6
    • Tri Vo's avatar
      Label /proc/sys/kernel/pid_max as proc_pid_max. · ab35e434
      Tri Vo authored
      am: 4081fd39
      
      Change-Id: Iffd1f51451929b92898fd65da600b6259f85a50e
      ab35e434
    • Tri Vo's avatar
      Label /proc/sys/kernel/pid_max as proc_pid_max. · 4081fd39
      Tri Vo authored
      And give shell domain read access to /proc/sys/kernel/pic_max.
      
      Bug: 69569397
      Test: adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests
      --gtest_filter=pthread.pthread_mutex_owner_tid_limit
      Change-Id: Ib56c18ed553ad2c2113e6913788a4c00965483cc
      4081fd39
  3. Nov 27, 2017
    • Nick Kralevich's avatar
      Clean up old file-based OTA SELinux rules · 6cb6dc84
      Nick Kralevich authored
      am: b8b4f5d6
      
      Change-Id: I68d5ca0bf61c25e54f8d6a6aa77a326c3c0d67bf
      6cb6dc84
    • Nick Kralevich's avatar
      Clean up old file-based OTA SELinux rules · b8b4f5d6
      Nick Kralevich authored
      Remove a number of SELinux rules which were required to support file
      based OTA. After this, we can have a much stronger assertion that files
      on /system are immutable. Tighten up the neverallow rules at the same
      time.
      
      Bug: 35853185
      Bug: 15575013
      Bug: 69664758
      Test: adb reboot recovery && adb sideload [file]
      Change-Id: I22aa208859b8478a2a90e1ed1c0f0d6b62a6664e
      b8b4f5d6
  4. Nov 22, 2017
  5. Nov 21, 2017
  6. Nov 20, 2017
Loading