- Sep 07, 2017
-
-
Hung-ying Tyan authored
am: 0d5bca44 Change-Id: I31b9e976864301454fd82108d51f2ac9cda34578
-
Hung-ying Tyan authored
am: e83f1e56 Change-Id: I6c7a9a6c52f670a8f18240def3b0b1f416001236
-
- Sep 06, 2017
-
-
Hung-ying Tyan authored
On full Treble devices, servicemanager should only host services served from processes on /system; nonplat_service_contexts should not be created at all in this case. Bug: 36866029 Test: Build marlin and make sure nonplat_service_contexts is not created. Change-Id: Id02c314abbb98fc69884198779488c52231d22c3 Merged-In: Id02c314abbb98fc69884198779488c52231d22c3
-
- Sep 05, 2017
-
-
Steven Moreland authored
am: 8b6ceed0 Change-Id: I39a8c2a75f646f3943d925adc4444777a90b9076
-
Steven Moreland authored
am: 5b2ebd3b Change-Id: I74209b877fdacaa485798b393678989029835924
-
Steven Moreland authored
This reverts commit 9216a6ad. Bug: 65206688 Merged-In: I8e61b77a1abe9543e4fba77defb8062407676fcf Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
-
- Sep 01, 2017
-
-
Dan Willemsen authored
am: 4deeab5c Change-Id: I74319e51a152ba35fdf076a4dffdeeb0dc69763b
-
Dan Willemsen authored
am: cdaf97bf Change-Id: Ibcb3d728c233530f7354b409bf3849a021532b5d
-
Treehugger Robot authored
-
Dan Willemsen authored
Test: SANITIZE_HOST=true m treble_sepolicy_tests Change-Id: I9190dc06715bbbac8a267a143801f99f911decf3
-
Robert Benea authored
am: adf68570 Change-Id: Ida2b4c0d8f400c753566861bd48bcf5459fc40b7
-
Robert Benea authored
am: b22278e4 Change-Id: Id1c46283531412a75ffe46f1beb26d5cdc732b8f
-
Robert Benea authored
-
- Aug 31, 2017
-
-
Lazar Trsic authored
am: 1019861b Change-Id: Id63c00a6cef89bd745947d9611d08b522426d8d1
-
Lazar Trsic authored
am: f58f1499 Change-Id: Id2eecfe21cfffec6ef95a194f0119d19ef43573e
-
Lazar Trsic authored
Change-Id: I721a48a441c4a416c1119b17086462f7cb8e5097
-
Bowgo Tsai authored
am: 03015901 Change-Id: I9d37f7b1b15b32e2f9b69bbddd30276611019924
-
Bowgo Tsai authored
am: 851d5b64 Change-Id: Idc8aef8e3d250b7b7f40d0a51a528988f629298c
-
Treehugger Robot authored
-
- Aug 30, 2017
-
-
Robert Benea authored
Currently lmkd is not able to read memcg info. The mem/swap usage info are used by lmkd to ugrade medium pressure events to critical level. Test: tested on gobo Bug: 65180281 Change-Id: I19d0eb53d5e754c176ffeda1b5d07049e6af8570
-
- Aug 29, 2017
-
-
Ed Coyne authored
Iot would like to allow bootanim to load libraries from /oem but in order for device-specfic sepolicies to grant exec this global restriction needs to be relaxed. Bug: 37992717 Test: Tested with Iot sepolicies in effect and bootanim can exec. Change-Id: I6462bf510562eb3fb06304e50b68fba05d37b285
-
Jeff Vander Stoep authored
am: 9d23d8eb Change-Id: Icdf8cf91dc3dd5e8c778e50138d61aca215dd83a
-
Jeff Vander Stoep authored
am: 94e3dfc3 Change-Id: I63f038889fcf85c9393ec78ae0ac8a30b5806707
-
Treehugger Robot authored
- Aug 28, 2017
-
-
Jeff Vander Stoep authored
This is needed to retain app's previous access to /sys/devices/system/cpu. When these files were previously labeled in file_contexts, symlinks were labeled as sysfs_devices_system_cpu. When labeling was moved to genfs_contexts symlinks all have the default sysfs label. avc: denied { getattr } for comm="main" path="/sys/devices/system/cpu/cpu0/cpufreq" dev="sysfs" ino=41897 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0 Change-Id: Idaa565390bca13d3819e147fcea4214956c0f589 Bug: 64270911 Test: build aosp_marlin
-
Bowgo Tsai authored
Bug: 63910933 Test: boot sailfish in normal mode, checks adbd is started Test: boot sailfish in recovery mode, checks adbd is started Test: boot bullhead in normal mode, checks adbd is started Test: boot bullhead in recovery mode, checks adbd is started Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79 Merged-In: I35ed78a15a34626fbd3c21d030e2bf51033f7b79 (cherry picked from commit e2423d14)
-
- Aug 25, 2017
-
-
Mark Salyzyn authored
am: e028be05 Change-Id: I835ca57fa962cd382646604139fc56c742b2de97
-
Mark Salyzyn authored
am: d27aee33 Change-Id: Ia64de6f9da61ce31ae10d8258a3692ce5a0e5815
-
Mark Salyzyn authored
-
Dan Cashman authored
am: b1b36bf2 Change-Id: I7cf6a6cf435022cb56a1b4899158fb5f390390fe
-
Dan Cashman authored
am: 36ee91d4 Change-Id: I9af35533587e962c63b6dd2543b047bf9899fb5e
-
Dan Cashman authored
Bug: 36899958 Test: Builds 'n' boots. Change-Id: I5836a18f9d0a9a976dda7304045e3b9e1e84565e Merged-In: I5836a18f9d0a9a976dda7304045e3b9e1e84565e (cherry picked from commit c0713e86)
-
- Aug 24, 2017
-
-
Mark Salyzyn authored
Switch from /data/misc/reboot/last_reboot_reason to persistent Android property persist.sys.boot.reason for indicating why the device is rebooted or shutdown. Introduce protection for all boot reason properties Protect the following properties with these labels ro.boot.bootreason u:object_r:bootloader_boot_reason_prop:s0 sys.boot.reason u:object_r:sys_boot_reason_prop:s0 persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0 Setup the current as-need access rules for each. ToDo: Remove u:object_r:reboot_data_file after internal fixes. Test: system/core/bootstat/boot_reason_test.sh Bug: 64687998 Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
-
- Aug 23, 2017
-
-
Jeff Vander Stoep authored
am: 5d478edd Change-Id: If2fc3e9b14cd672d9989f4023b665d70e938b5af
-
Jeff Vander Stoep authored
am: 99cbe530 Change-Id: I008a9509e758cee7802030e1146bbf140b31ba78
-
Treehugger Robot authored
-
Alex Light authored
am: d9918e12 Change-Id: Ifc423169476761cb9abd840b75088869c02a76bd
-
Alex Light authored
am: 9cd2abc2 Change-Id: Ia6c246e2c33453ffcdee628266553a9dbde7da22
-