- Apr 06, 2017
-
-
Dan Cashman authored
am: c01e5a13 Change-Id: I700030a34443305af955a6153921447024a90d4f
-
Dan Cashman authored
am: 38416182 Change-Id: I9e08b187ccad4f4263de54aae1248b1691aa7d08
-
TreeHugger Robot authored
-
Martijn Coenen authored
am: 3dca6eb2 Change-Id: I84eb61aad4ac9a27fd804abaae3830c6a8ced97b
-
Martijn Coenen authored
am: 133a9c41 Change-Id: I2991bcea9893c2b9cd2b320e4ef1b071126f133e
-
Mark Salyzyn authored
am: 9c6a2447 Change-Id: I18cf57e51df23efe6be2bcedcc46437bda2f77ed
-
Dan Cashman authored
am: bc9e17bb Change-Id: I4a5643d0725b76afeb191ba121556a1e95fc3771
-
Martijn Coenen authored
-
Mark Salyzyn authored
am: dd9ba982 Change-Id: I5f0a5d7e8dd238f2f105bfac101897c1fda7aa44
-
Mark Salyzyn authored
-
Dan Cashman authored
am: a902511f Change-Id: Idb05d766da22a1f52252e27f632af49928779987
-
TreeHugger Robot authored
-
Ningyuan Wang authored
am: 84674b7e Change-Id: I17c3df373607889b0ce1fa9cbda16346298e3ca9
-
Martijn Coenen authored
Bug: 34454312 Bug: 36052864 Test: device boots, works Change-Id: If61d9b736a74c5944cef4449de4dfbaf78d9ccfa
-
Ningyuan Wang authored
am: 705a3d0b Change-Id: I3b934fc0fb674051c8227b2a6f405e454ff9fa42
-
Ningyuan Wang authored
-
Dan Cashman authored
This is a necessary first step to finalizing the SELinux policy build process. The mapping_sepolicy.cil file is required to provide backward compatibility with the indicated vendor-targeted version. This still needs to be extended to provide N mapping files and corresponding SHA256 outputs, one for each of the N previous platform versions with which we're backward-compatible. Bug: 36783775 Test: boot device with matching sha256 and non-matching and verify that device boots and uses either precompiled or compiled policy as needed. Also verify that mapping_sepolicy.cil has moved. Change-Id: I5692fb87c7ec0f3ae9ca611f76847ccff9182375
-
Dan Cashman authored
sepolicy-analyze allows users to see all types that have a given attribute, but not the reverse case: all attributes of a given type. Add a '--reverse' option which enables this, but keeps the previous interface. Usage: sepolicy-analyze sepolicy attribute -r init Bug: 36508258 Test: Build and run against current policy. (cherry picked from commit d444ebed) Change-Id: I9813ebf61d50fb5abbc8e52be4cf62751979bbd4
-
Mark Salyzyn authored
logcatd is the same as logcat, except that the -L flag, if supplied, runs once, then the command re-runs itself without the -L flag with the same argument set. By introducing a logcatd daemon executable we can solve the problem of the longish reads from pstore that sometimes occur when the system is excessively busy spinning in a foreground task starving this daemon as we absorb the delay in an init service, rather than in an init exec. This would not have been efficiently possible without the introduction of liblogcat. Test: gTest logcat-unit-tests Test: Manual check logpersist operations Bug: 28788401 Bug: 30041146 Bug: 30612424 Bug: 35326290 Change-Id: I3454bad666c66663f59ae03bcd72e0fe8426bb0a
-
Alex Klyubin authored
am: ec9209be Change-Id: I4162ad407b058de775089b003f6a9227db379154
-
Alex Klyubin authored
am: 7c3dbfeb Change-Id: I5480d47059b876ceffdf029ea14f6480516b43ef
-
Alex Klyubin authored
-
Alex Klyubin authored
am: 0f7e68bf Change-Id: I9120edc34036ab7f347d0ae27d99dc62aebab5c5
-
Alex Klyubin authored
am: cfcffa9a Change-Id: I5979d4ea8a54944a7762cee2db04a078d0bd66bd
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 6d2e29c1 Change-Id: I130f42e045695b3c08d25f4ba287a35c4687d8c1
-
Andreas Gampe authored
am: ea26683e -s ours Change-Id: Id2a557022bfee400839784f2ae8623cea53fced9
-
Sandeep Patil authored
am: 37792cec Change-Id: I469f6de852f10515148ef824c85ff2febf31322e
-
Andreas Gampe authored
am: 82071b68 Change-Id: Ia3bd034033f82aaed63b173e5205e7449e2743ef
-
TreeHugger Robot authored
* changes: sepolicy: relabel /vendor Sepolicy: Add ASAN-Extract
-
Nathan Harold authored
am: 73747426 Change-Id: I6520c8c1c89ce0ce6c6165822e63c672290c9ad0
-
Nathan Harold authored
am: ca7c99ed Change-Id: I01ebaeb50ce10a1114ffc9a30999640bc86ff368
-
Nathan Harold authored
am: 516c9abf Change-Id: I59f1abcdb1f7184fc795c2164a5799e7ff7f4772
-
Nathan Harold authored
am: 63a93156 Change-Id: I26a67ce475de966ec979cf4dfddd8b3210802552
-
Nathan Harold authored
* changes: Add IpSecService SEPolicy Update Common NetD SEPolicy to allow Netlink XFRM
-
- Apr 05, 2017
-
-
Sandeep Patil authored
The CL splits /vendor labeling from /system. Which was allowing all processes read, execute access to /vendor. Following directories will remain world readable /vendor/etc /vendor/lib(64)/hw/ Following are currently world readable but their scope will be minimized to platform processes that require access /vendor/app /vendor/framework/ /vendor/overlay Files labelled with 'same_process_hal_file' are allowed to be read + executed from by the world. This is for Same process HALs and their dependencies. Bug: 36527360 Bug: 36832490 Bug: 36681210 Bug: 36680116 Bug: 36690845 Bug: 36697328 Bug: 36696623 Bug: 36806861 Bug: 36656392 Bug: 36696623 Bug: 36792803 All of the tests were done on sailfish, angler, bullhead, dragon Test: Boot and connect to wifi Test: Run chrome and load websites, play video in youtube, load maps w/ current location, take pictures and record video in camera, playback recorded video. Test: Connect to BT headset and ensure BT audio playback works. Test: OTA sideload using recovery Test: CTS SELinuxHostTest pass Change-Id: I278435b72f7551a28f3c229f720ca608b77a7029 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Andreas Gampe authored
Add selinux policies for init script and shell script to unzip a tar containing ASAN libraries on boot. Bug: 36458146 Test: m && m SANITIZE_TARGET=address Test: manual (build steps for tar missing) Change-Id: I5c3cb233aae93ee9985431090af902b0e3c1b0a7 (cherry picked from commit 0b743050) Merged-In: I5c3cb233aae93ee9985431090af902b0e3c1b0a7
-
Steven Moreland authored
am: 67b66f99 Change-Id: I0bc8e8e3c29a312a7ac9d07154aaab0dc1965809
-
Steven Moreland authored
am: 6821bb40 Change-Id: I90f1ae5f671cbf7bcdcab728dd0bfac673f95050
-
TreeHugger Robot authored
-