- May 08, 2017
-
-
Mikhail Naganov authored
am: b00a85c3 Change-Id: I82f7934d824a35644263eb298d6c2c5eb018c8b5
-
Mikhail Naganov authored
am: 4aac6fdb Change-Id: I1614f394e0f0c071705e3696d3dd8124e72c24c2
-
Mikhail Naganov authored
am: 9686cbcd Change-Id: Id0bacbd2022c24615b9e99108af1a8510be248fb
-
- May 06, 2017
-
-
Jeff Sharkey authored
am: c659e37c Change-Id: I4d1285c41c77b9e828753b628cfdc76d3e2a3dd9
-
Jeff Sharkey authored
-
- May 05, 2017
-
-
Jeff Sharkey authored
When installd clears cached files on external storage, the sdcardfs kernel filesystem needs to be kept in the loop to release any cached dentries that it's holding onto. (Otherwise the underlying disk space isn't actually released.) installd can already delete the underlying files directly (via the media_rw_data_file rules), so this technically isn't expanding its capabilities. avc: granted { search } for name="/" dev="tmpfs" ino=6897 scontext=u:r:installd:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir avc: denied { open } for path="/mnt/runtime/default/emulated/0/Android/data" dev="sdcardfs" ino=589830 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=1 avc: denied { write } for name="com.google.android.inputmethod.japanese" dev="sdcardfs" ino=590040 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 avc: denied { remove_name } for name="cache_r.m" dev="sdcardfs" ino=589868 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 avc: denied { getattr } for path="/mnt/runtime/default/emulated/0/Android/data/.nomedia" dev="sdcardfs" ino=589831 scontext=u:r:installd:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 Test: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.StorageHostTest Bug: 37486230 Change-Id: Icfd00a9ba379b1f50c48fe85849304cf9859bcb2
-
Daniel Nicoara authored
am: 0181f5f1 Change-Id: Iba73223f49b67e48d893256428f4ef1ff97f62c5
-
Daniel Nicoara authored
-
- May 04, 2017
-
-
Mikhail Naganov authored
The following HAL methods use file descriptors to write dump info comprising audioflinger debug dump: IDevice.debugDump IEffectsFactory.debugDump IStream.debugDump Bug: 37993476 Test: check contents of media.audio_flinger section in a bugreport captured on Pixel device Change-Id: I77d347c019ac93c3ba0d54ce50f0fdc243b04685
-
Dimitry Ivanov authored
am: 1696a6e8 Change-Id: I1e5bdf92b84a56f5bdd7731afae6d324128f241a
-
Dimitry Ivanov authored
am: eb80c0db Change-Id: I1b5cbd08d80ba43979da2ab46b40d28ff14a93e8
-
Dimitry Ivanov authored
am: bf030965 Change-Id: I3a10c619ce6e65ce531276ef4f97489605897062
-
Dimitry Ivanov authored
This is needed by linker to be able to load libraries from memfd which currently generated following denial: avc: denied { getattr } for path=2F6D656D66643A666F6F626172202864656C6574656429 dev="tmpfs" ino=902079 scontext=u:r:shell:s0 tcontext=u:object_r:shell_tmpfs:s0 tclass=file permissive=0 Bug: http://b/37245203 Bug: http://b/37916741 Test: builds Change-Id: I5b57b6cada50a62657c8daaaaaa56f1ee9cdb376 (cherry picked from commit a0d3ff8e)
-
Dimitry Ivanov authored
am: a0d3ff8e Change-Id: I8965be0fe9d6ae9bb3a283731d3df226a5b4173b
-
Dimitry Ivanov authored
This is needed by linker to be able to load libraries from memfd which currently generated following denial: avc: denied { getattr } for path=2F6D656D66643A666F6F626172202864656C6574656429 dev="tmpfs" ino=902079 scontext=u:r:shell:s0 tcontext=u:object_r:shell_tmpfs:s0 tclass=file permissive=0 Bug: http://b/37245203 Bug: http://b/37916741 Test: builds Change-Id: I5b57b6cada50a62657c8daaaaaa56f1ee9cdb376
-
Ian Pedowitz authored
am: 47859a93 Change-Id: I3ec67ae45f165601f22f7ebb446fc626300ee1b6
-
Ian Pedowitz authored
-
- May 03, 2017
-
-
Ian Pedowitz authored
This reverts commit 8713882b. Reason for revert: b/37355569 Bug: 37480230 Bug: 37896931 Bug: 37355569 Change-Id: Ic07d948fd0b4a0a8434e1f4f0c8e559c4258cf5e
-
- May 02, 2017
-
-
TreeHugger Robot authored
-
Michael Wright authored
am: 7cc3f0a9 Change-Id: Ie5fbe081e35116ee4751b43f323b83ac56993870
-
TreeHugger Robot authored
-
Michael Wright authored
Bug: 37480230 Bug: 37896931 Test: build, boot Change-Id: Ib8d4309d37b8818163a17e7d8b25155c4645edcf
-
Steven Moreland authored
am: d64561f7 Change-Id: Ia2b7f107e2e1ccb38f3e9010dccb7411d168dcdf
-
Steven Moreland authored
Whether a device is full Treble or not, omx should be able to access vndbinder Test: (sanity) oc-dev marlin boots + YouTube + lshal Fixes: 37528973 Change-Id: Idd734b42c7dfe3e09e544680a6893b03910ecd3e
- May 01, 2017
-
-
Andreas Gampe authored
am: 274c4e33 Change-Id: Ic46f83ae348c57ad306748d03456e62c9a4600d4
-
Andreas Gampe authored
am: acbf2ad3 Change-Id: Ic59386f9a2a02438299ee11f3b36fdd7b9b34c99
-
Andreas Gampe authored
am: 7f4b2ad5 Change-Id: I3c10871ddc11f43f685ef4a7064d416a1ca450f1
-
Treehugger Robot authored
-
Andreas Gampe authored
am: e34a9569 -s ours Change-Id: Ied60d0c619b9daf7d6ecdba40e7bd2b817b0f8fe
-
Salvador Martinez authored
am: 66109bdb Change-Id: I5271b9b04cf08656a868a6297ebf0f64f4714fd9
-
Salvador Martinez authored
-
Andreas Gampe authored
am: 2d7ec8d4 Change-Id: I4fc205afca8f64a710d0ceaab356a8dd76a7923a
-
Andreas Gampe authored
am: 9e0d6aeb Change-Id: I6e08846e7f580851f9cd0d7050097dcba0f5dbb8
-
Treehugger Robot authored
-
Andreas Gampe authored
Temporary workaround. Bug: 37755687 Test: ASAN_OPTIONS= SANITIZE_HOST=address m Merged-In: I001a42ea6463a1e137e1f5328755596f986323de Change-Id: I001a42ea6463a1e137e1f5328755596f986323de
-
TreeHugger Robot authored
-
Joel Scherpelz authored
am: 638ae7fe Change-Id: Id7d7e918b3d7817a9da03613672aabf332a1563e
-
Joel Scherpelz authored
am: 97e2c65c Change-Id: Iab07ec973bddeb2e431fadd4c839f6b882c433cf
-
Joel Scherpelz authored
am: edd41261 Change-Id: I86efaccb28dc12db792370a4499540676c71a71c
-