- Dec 07, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Dec 06, 2017
-
-
Xin Li authored
-
Xin Li authored
Exempt-From-Owner-Approval: Changes already landed internally Change-Id: I11a15296360fd68485402e33814e7e756925c6a8
-
Andreas Gampe authored
Simpleperf reads kernel notes. Bug: 70275668 Test: m Test: manual Change-Id: I1a2403c959464586bd52f0398ece0f02e3980fc4
-
Andreas Gampe authored
Label /sys/kernel/notes. Bug: 70275668 Test: m Change-Id: Ieb666425d2db13f85225fb902fe06b0bf2335bef
-
Treehugger Robot authored
-
Josh Gao authored
Bug: http://b/63989615 Test: mma Change-Id: I41506ecb0400867230502181c1aad7e51ce16d70
-
Treehugger Robot authored
-
Andreas Gampe authored
Until simpleperf does not optimistically try /data/local/tmp for tmp storage, silence the denials. Bug: 70232908 Test: m Test: manual Change-Id: Icbc230dbfbfa6493b4e494185c536a10e3b0ae7b
-
Tri Vo authored
Add write access to: sysfs_android_usb sysfs_leds sysfs_power sysfs_zram Add setattr access to: sysfs_android_usb sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_power sysfs_leds sysfs_ipv4 Bug: 70040773 Bug: 65643247 Change-Id: I68e2e796f5599c9d281897759c8d8eef9363559a Test: walleye boots with no denials from init to sysfs.
-
kaichieh authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: I53a9715b2f9ddccd214f4cf9ef081ac426721612
-
- Dec 05, 2017
-
-
Jason Monk authored
am: 07131ec8 Change-Id: Id52c9d602fd05e07d79b39b78c164015eab888b0
-
Jaegeuk Kim authored
am: c8e7a9f4 Change-Id: Ib7ea2f91d6a2099f76c0124097db2f389da9b95e
-
Jason Monk authored
Test: make/sync Bug: 68751119 Change-Id: Ie3c60ff68b563cef07f20d15f298d6b62e9356bc
-
Jaegeuk Kim authored
This allows to format sdcard for adoptable storage. Bug: 69641635 Change-Id: I8d471be657e2e8f4df56c94437239510ca65096e Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- Dec 04, 2017
-
-
rickywai authored
- Dec 02, 2017
-
-
Andreas Gampe authored
am: 99e4f402 Change-Id: I80eaf2eb1867d99137c1c7afd1708ebaf6a60e35
-
Andreas Gampe authored
Corresponds to commit 410cdebaf966746d6667d6d0dd4cee62262905e1 in system/extras. Bug: 32286026 Test: m Change-Id: I1e0934aa5bf4649d598ec460128de6f02711597f
-
- Dec 01, 2017
-
-
Tri Vo authored
Add write access to: sysfs_android_usb sysfs_leds sysfs_power sysfs_zram Add setattr access to: sysfs_android_usb sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_power sysfs_leds sysfs_ipv4 Bug: 65643247 Test: walleye boots with no denials from init to sysfs. Change-Id: Ibc9a54a5f43f3d53ab7cbb0fdb9589959b31ebde
-
Joel Galenson authored
am: cea60d7e Change-Id: I9c0195571c616525fe8daaefc76661d111a57917
-
Treehugger Robot authored
- Nov 30, 2017
-
-
Joel Galenson authored
Now that creating a symlink automatically sets its context, init needs permission to create this file. Bug: 69965807 Test: Booted device and tested wifi and camera. Change-Id: I41f5ca8f4d877312c9b2a909001fe9cd80c3d458
-
Calin Juravle authored
am: acbda504 Change-Id: I9575610aeae0464661ad23d0eac696915cb0064e
-
Ricky Wai authored
Bug: 63908748 Test: built, flashed, able to boot Change-Id: I3cfead1d687112b5f8cd485c8f84083c566fbce2
-
Calin Juravle authored
This is needed in order to get the stat-size of the files. Bug: 30934496 Test: gts-tradefed -m GtsAndroidRuntimeManagerHostTestCases Change-Id: I1df0ba941e8f9ff13a23df4063acc3c4f1555c1b
-
Connor O'Brien authored
am: 33ba9c54 Change-Id: I09d49857f0bffc37090c4429879fb5288cbc9b90
-
Connor O'Brien authored
-
Jeff Vander Stoep authored
am: f838a3bc Change-Id: Ia2c73bd7b5524da7df7aa96c14dd60e30feecce2
-
Treehugger Robot authored
-
- Nov 29, 2017
-
-
Jeff Vander Stoep authored
Tclass was omitted for two entries. Bug: 69928154 Bug: 69366875 Test: build Change-Id: Ie12c240b84e365110516bcd786b98dc37295fdb9
-
Connor O'Brien authored
/proc/uid/ provides the same per-uid time_in_state data as /proc/uid_time_in_state, so apply the same type and let system_server read directories of this type. Bug: 66953705 Test: system_server can read /proc/uid/*/time_in_state files without denials on sailfish Change-Id: Iab7fd018c5296e8c0140be81c14e5bae9e0acb0b Signed-off-by:
Connor O'Brien <connoro@google.com>
-
Nicholas Sauer authored
am: 4ebbe461 -s ours Change-Id: I72f7b323551fc2151668203db725710231c836c5
-
Nicholas Sauer authored
-