- Feb 02, 2018
-
-
Bowgo Tsai authored
This reverts commit 9aa8496f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build Change-Id: I77671a74cd952544a1dbb3daabc2bb449a7c2cf2
-
Bowgo Tsai authored
This reverts commit 3506ad3f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build
-
- Feb 01, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
Merge "Add this rule allows incidentd CTS tests be able to use incident command to fetch data from shell."
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72811052 Test: Built policy. Change-Id: Ifcfe71c717a3b1e59cd1810c7f9be588d48c99a5
-
Bowgo Tsai authored
Need use 'nonplat_service_contexts_file' as the file context for /vendor_service_context on non full-treble device. Otherwise, servicemanager can't read the file. Bug: 72787689 Test: build Change-Id: Ib54e4f2501c7bbf8b397eacf4afadfae344ddd03
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Jan 31, 2018
-
-
Yin-Chia Yeh authored
-
Treehugger Robot authored
-
Yi Jin authored
command to fetch data from shell. Bug: 72502621 Test: N/A Change-Id: I5b581f647c2f2932f0e3711965b98351ef7e6063
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72749888 Test: Built policy. Change-Id: I588bba52d26bcc7d93ebb16e28458d9125f73108
-
Ruchi Kandoi authored
Bug: 72746517 Test: Boot a device and check NFC 1.1 service loads Change-Id: Ia281af8add0371525971f076bf513c694e7ea912
-
Treehugger Robot authored
-
Joel Galenson authored
Instead of getting these permissions, it is better to add the process to a group or change the permissions of the files it tries to access. Test: Built the policy for many devices. Change-Id: If023d98bcc479bebbedeedf525965ffb17a0e331
-
Bowgo Tsai authored
Current sepolicy CIL files are built by several command-line tools in Android.mk. This change extracts some of the build logic into a python script to relief the effort in Android.mk. The first command is `build_sepolicy build_cil`. It's possible to add more sub-commands under the build_sepolicy script in the future. Bug: 64240127 Test: build and boot a device Test: checks the content of $OUT/vendor/etc/selinux/vendor_sepolicy.cil is the same as before Change-Id: I0b64f1088f413172e97b579b4f7799fa392762df
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: Iea87a502bc6191cfaf8a2201f29e4a2add4ba7bf
-
Treehugger Robot authored
-
Jaekyun Seok authored
This CL will allow only specific components to read radio_prop. Bug: 72459527 Test: tested with walleye Change-Id: I6b6c90870987de976187ff675005c5d964b48cda
-
Treehugger Robot authored
* changes: Correctly label data types Test that /data is properly labeled
-
Siarhei Vishniakou authored
Bug: 62940136 Test: read /dev/v4l-touchX from inputflinger Change-Id: Ifcece4192c567e0cbaba1b7ad40d25c8f34f8e40
-
Yin-Chia Yeh authored
Allow external camera HAL to monitor video device add/removal. Bug: 64874137 Change-Id: I1a3116a220df63c0aabb3c9afd7450552e6cd417
-
- Jan 30, 2018
-
-
Joel Galenson authored
Remove bugs that have been fixed, re-map duped bugs, and alphabetize the list. Test: Booted Walleye and Sailfish, tested wifi and camera, and observed no new denials. Change-Id: I94627d532ea13f623fe29cf259dd404bfd850c13
-
Chenbo Feng authored
Remove the untrusted apps and priviledged apps from the group that can directly access xt_qtaguid module related file. All apps that need to access app network usage data need to use the public API provided in framework. Test: Flashed with master branch on marlin, verified phone boot, can browse web, watch youtube video, make phone call and use google map for navigation with either wifi is on or off. run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest run cts -m CtsNativeNetTestCases Bug: 68774956 30950746 Change-Id: I9b3db819d6622611d5b512ef821abb4c28d6c9eb
-
Jeff Vander Stoep authored
Data outside /data/vendor must have the core_data_file_type attribute. Test: build (this is a build time test) Bug: 34980020 Change-Id: Ia727fcad813d5fcfbe8f714246364bae0bda43bd Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
-
Jeff Vander Stoep authored
Data outside of /data/vendor should have the core_data_file_type. Exempt data_between_core_and_vendor for some types. Ensure core_data_file_type and coredomain_socket do not get expanded to their underlying types. Test: build sepolicy for all targets in master (this is a build time test) Bug: 34980020 Change-Id: I59387a87875f4603a001fb03f22fa31cae84bf5a (cherry picked from commit bdd45479)
-
Jeff Vander Stoep authored
chmod +x Test: build all sepolicy targets. Change-Id: I9e47b78667e4a213c31ecce0e37fe7f84abd9655
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Bug: 72668919 Test: build Change-Id: Id156b40a572dc0dbfae4500865400939985949d9
-
Treehugger Robot authored
-
Ruchi Kandoi authored
-
Treehugger Robot authored
-
- Jan 29, 2018
-
-
Joel Galenson authored
This script will build the SELinux policy for multiple targets in parallel. To use it, run: ./build_policies.sh <Android root directory> <output directory> [specific targets to build] If you do not pass any individual targets, it will build all targets it can find. It will print out the list of failing targets. You can open up the corresponding log file in the output directory to see the exact errors. This script is still a work in progress. It currently cannot discover all build targets (it misses ones "lunch" does not list). Bug: 33463570 Test: Ran script to build multiple targets with and without failures. Change-Id: Iee8ccf4da38e5eb7ce2034431613fe10c65696ab
-
Ruchi Kandoi authored
Test: App startup on boot Change-Id: I7740aafc088aadf676328e3f1bb8db5175d97102
-
Primiano Tucci authored
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72472544 Test: Built policy. Change-Id: I01f0fe3dc759db66005e26d15395893d494c4bb7
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Tom Cherry authored
vendor_init exists on the system partition, but it is meant to be an extention of init that runs with vendor permissions for executing vendor scripts, therefore it is not meant to be in coredomain. Bug: 62875318 Test: boot walleye Merged-In: I01af5c9f8b198674b15b90620d02725a6e7c1da6 Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
-
Treehugger Robot authored
-