- Jun 10, 2017
-
-
Jerry Zhang authored
am: d782dffa Change-Id: Ia96da46def754c3a8fcc909d3e3823db2ce77c3b
-
Jerry Zhang authored
am: 6aa9869a Change-Id: I5ee6145cfa3c6701450f2984eacdde41ccd505ec
-
Jerry Zhang authored
-
- Jun 09, 2017
-
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
These permissions are granted to domain. Remove audit statements for them in domain deprecated. avc: granted { search } for pid=905 comm="update_engine" name="/" dev="cgroup" ino=1 scontext=u:r:update_engine:s0 tcontext=u:object_r:cgroup:s0 tclass=dir duplicate messages suppressed avc: granted { open } for pid=905 comm="update_engine" path="/dev/cpuset/foreground/tasks" dev="cgroup" ino=25 scontext=u:r:update_engine:s0 tcontext=u:object_r:cgroup:s0 tclass=file Test: build and boot Marlin Change-Id: Ib2a61e5f5476ff761d0e5ecde57ba7a1777a73e9
-
Dan Cashman authored
am: 47609809 Change-Id: I4a294fc077f665ac3b43f0b7421d7eb30c9a8bb9
-
Dan Cashman authored
am: 96c619c8 Change-Id: Ib2d0ad551b0a8c4e3bf8529dd89fb8f563e5b651
-
- Jun 08, 2017
-
-
Dan Cashman authored
This reverts commit 50889ce0. Bug: 62427402 Test: Build and boot. Change-Id: I32eae7997c901981d3228b61f33322a7c2c84301
-
TreeHugger Robot authored
-
Bartosz Fabianowski authored
Revert "SELinux policy for secure persistent netd storage" am: 06486796 am: edcfb2e1 am: 0f52004b am: 722583fb Change-Id: I5b13461ca05c04a2082689b7301f3d1b850d0933
-
Bartosz Fabianowski authored
am: 0f52004b Change-Id: I5df1b7411cc87c6b983d80d716d9ec05f1ba9339
-
Bartosz Fabianowski authored
am: edcfb2e1 Change-Id: I86565448fa4d5ccd412772825decb5dc62cd6343
-
Bartosz Fabianowski authored
am: 06486796 Change-Id: Ia575329a0d4e83ff0d3a70b30ad3ef7e026c42f1
-
Bartosz Fabianowski authored
This broke the build on master. See b/17613910#comment17 for details. This reverts commit ef1fd98b. Change-Id: I11f7d463061a9b6340c11827135586266e26f016
-
Joel Scherpelz authored
am: d6da377a Change-Id: Id608af3667c5ba9e60dd4630f9b718bc84ff96d0
-
Joel Scherpelz authored
am: 36efd0c4 Change-Id: I31b2eda5c305723b1f35ce2ba284e6593ac891b6
-
Joel Scherpelz authored
am: 9381cb3d Change-Id: I3ae9005ee76b51105ec215cefc5a81c25405c482
-
Joel Scherpelz authored
am: ef1fd98b Change-Id: I6d5e2f4b43b3b52708190e8111828e54a252d5a7
-
Joel Scherpelz authored
This is used to persist RFC 7217 stable secrets across device reboots. Test: as follows - Manually tested that stable_secret is generated on first use and persists until reset of user data partition (factory reset). - Tested that "adb shell getprop" was denied access to persist.netd.stable_secret after running "adb unroot". Bug: 17613910 Change-Id: I4dad00fb189d697aceaffae49ad63987c7e45054
-
TreeHugger Robot authored
-
Jerry Zhang authored
This reverts commit c147b592. The new domain changed neverallows, breaking CTS compatability. Revert the domain now, with the intention to re-add for the next release. Bug: 62102757 Test: domain is set to priv_app Change-Id: I907ff7c513cd642a306e3eaed3937352ced90005
-
Jin Qian authored
Test: let fs_mgr format a damaged /data partition Bug: 35219933 Change-Id: I379567772c73e52f532a24acf640c21f2bab5c5b
-
- Jun 07, 2017
-
-
Jerry Zhang authored
-
Jerry Zhang authored
This reverts commit c00c07c1. Change-Id: I0c4f5e8cece9c48672a5210adb7e8427e4fd427a
-
TreeHugger Robot authored
-
Joel Galenson authored
This should improve performance, as file_contexts is slower than genfs_contexts. Bug: 62413700 Test: Built, flashed, and booted Marlin. Verified that some of the files have the correct context. Change-Id: Ia28707ec565a0792bc882fbffe9e8ab9968535f5
-
Jeff Vander Stoep authored
Addresses: avc: granted { read } for name="pipe-max-size" dev="proc" ino=470942 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read open } for path="/proc/sys/fs/pipe-max-size" dev="proc" ino=470942 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0 tclass=file Test: build policy Change-Id: I7d8721c73c4f3c51b3885a97c697510e61d1221b
-
TreeHugger Robot authored
-
Earl Ou authored
Service boottrace runs atrace out of shell context for tracing during boot. Therefore, we need the same permission set in shell.te to run atrace in boottrace service. Bug: 34094010 Test: None Change-Id: I94b2c3f9a74da377b0467112ebd4e1ee658847a4
-
- Jun 06, 2017
-
-
TreeHugger Robot authored
-
Dan Cashman authored
Copy the final system sepolicy from oc-dev to its prebuilt dir corresponding to its version (26.0) so that we can uprev policy and start maintaining compatibility files, as well as use it for CTS tests targeting future platforms. Bug: 37896931 Test: none, this just copies the old policy. Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: c6ba60d8 Change-Id: I1a091cb4715577db620ec5e0b3e3dabfcd15ee6a
-
Jeff Vander Stoep authored
am: e546e81b Change-Id: Iac0bb7ca4994a7921049881f94e767b34851052e
-
TreeHugger Robot authored
-
TreeHugger Robot authored