- Jun 15, 2017
-
-
Dan Cashman authored
ASAN makes use of shenanigans that violate our policy best-practices. This is by design. Exempt them from these tests to get it building again. Bug: 37740897 Test: Builds with ASAN enabled. Change-Id: Iffde28c2741466da5862b2dfe1fffa2c0d93caeb
-
- Jun 14, 2017
-
-
Carmen Jackson authored
Merge "Add debug selinux permission to write saved_cmdlines_size. am: e9381d5e am: d651e0b7" into oc-dr1-dev-plus-aosp am: 1c21d4bf -s ours Change-Id: I61071789474228aa6cc0f59b9ecfb9a859f0ae48
-
Carmen Jackson authored
am: 7683d565 -s ours Change-Id: I47c3530675ce5c55edc09bca749c7a897404d033
-
Android Build Merger (Role) authored
Merge "Add debug selinux permission to write saved_cmdlines_size. am: e9381d5e am: d651e0b7" into oc-dr1-dev-plus-aosp
-
Carmen Jackson authored
am: e180a613 Change-Id: Iaa5b2f434ebf712884d5823caf87e93de317e14e
-
Carmen Jackson authored
am: d651e0b7 Change-Id: I99c911d119c300e7035a111a24b0d900f435fca8
-
Carmen Jackson authored
am: e9381d5e Change-Id: I784011fc804dd43f431be62804761b100846dfbf
-
Carmen Jackson authored
am: e9381d5e Change-Id: Ic2192d5128543f28d2f91c4aedabab08b01669e5
-
TreeHugger Robot authored
-
Carmen Jackson authored
Now that we're expected to use this when taking traces, we need to add this permission so that Traceur can also access this file. Test: Used Traceur and saw the traces appear in the bugreports directory, as expected. Bug: 62493544 Change-Id: Ib4304176abbb51e2e3b45c566ff14574e1cfaa82 Merged-In: I464b0df30fabfc5f1c7cd7430e53e8d04bfacb53 (this merged-in is not the same change; it's a conflicting change in master)
-
Jeff Vander Stoep authored
avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:cache_file:s0 tclass=dir avc: granted { getattr } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file avc: granted { read } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { read open } scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file avc: granted { search } scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir Fixes: 62619253 Test: policy builds, no more "granted" messages in dmesg for recovery. Change-Id: I3f6d8ceee80307a01a8fd40cb4f8362a9825b1a3
-
TreeHugger Robot authored
-
Robert Benea authored
-
Joel Scherpelz authored
am: 733609da Change-Id: I248cfa3b85774569123a3b3f7e8d3c068005b7fc
-
Joel Scherpelz authored
am: 14a3cb28 Change-Id: Ib3b7dc9a8a702a32330ccb31f22cf746df8764fb
-
Joel Scherpelz authored
am: 5ee87b00 Change-Id: Id2dc995f88a60fe865387453234e3630a9975381
-
Joel Scherpelz authored
am: abb1ba65 Change-Id: I7765bfd350deb50847e83a1d3b5d7399206b4b9d
-
Tim Murray authored
Allow lmkd to access /dev/memcg once again. Test: lmkd can access memcg bug 36588803 Change-Id: I47b4e79260bcd2967d85d8151c83e624d432f409
-
Robert Benea authored
-
Robert Benea authored
This reverts commit 527f64e6. Change-Id: Ibc48af53431a8f7c7211999dcb571f492fb5ddb4
-
- Jun 13, 2017
-
-
Jeff Vander Stoep authored
Test that: - File types on /sys have attr sysfs_type - File types on /sys/kernel/debug have attr debugfs_type - File types on /data have attr data_file_type Test: build policy Change-Id: Ie4f1f1c7e5345da0999082962f084fdac6b85428
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: b3bdba4d Change-Id: I4d3a71a1ffd2004e3ac85d89686d24e00c112d6e
-
Jeff Vander Stoep authored
am: 78c58c79 Change-Id: I93ab700661ddad141f2ff9973187bb5b72ffad78
-
Jeff Vander Stoep authored
am: 5c383688 Change-Id: Iaf28a1b178427e5b2bd13f45485cc3504464f6fc
-
Jeff Vander Stoep authored
am: 77fe1de7 Change-Id: I71b4bca350a9a29dd45dfafe8c3d1938cb54a46f
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I87eb8bad11fc9c011289b8d97219835a08d18cd1
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I60a92781a5b923889e627d73e8922aca2607b67b
-
Daniel Cashman authored
-
Jeff Vander Stoep authored
[ 7.674739] selinux: selinux_android_file_context: Error getting file context handle (No such file or directory) Bug: 62564629 Test: build and flash marlin. Successfully switch between regular and recovery modes Change-Id: I0f871f8842d95322c844fb7b13ad1b4b42578e35
-
Dan Cashman authored
commit: 5c6a227e added the oc-dev sepolicy prebuilts (api 26.0), but did not include the corresponding base mapping file, which is to be maintained along with current platform development in order to ensure backwards compatibility. Bug: 37896931 Test: none, this just copies the old mapping file to prebuilts. Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
-
Robert Benea authored
-
Tim Murray authored
Allow lmkd to access /dev/memcg once again. Test: lmkd can access memcg bug 36588803 Change-Id: Ia57dbbc3987d8858c932103c4e546cbb88893207
-
- Jun 12, 2017
-
-
Jeff Vander Stoep authored
am: ef0ab603 Change-Id: I0c55b9a8301f6b0264ccf578258422995a0c8b84
-
Jeff Vander Stoep authored
am: 508921c4 Change-Id: I86ff1c1cd66a6d3e7955436923f25e47c1098a01
-
Jeff Vander Stoep authored
am: aee782ca Change-Id: I9210f221529abc0195dc39d198b042d02ca223ab
-
Jeff Vander Stoep authored
am: 82658116 Change-Id: I653ab6e4d8ff7a859ac489d4b05fdddb0668ae4e
-
Jeff Vander Stoep authored
am: 7a68c5ae Change-Id: Ic9f658984340b255114bb0f8d505fa6774f1cb04
-
Jeff Vander Stoep authored
am: 7a68c5ae Change-Id: Ide9c5ccdc2002972f311c9829c573b98f12fea44
-
Jeff Vander Stoep authored
am: 2703f3ee Change-Id: I2130641f315522740c150f4a22f8a4fe20a9a085
-