- Jan 23, 2018
-
-
Dongwon Kang authored
This is an experimental feature only on userdebug and eng build. Test: play MP4 file. install & uninstall media update apk. Bug: 67908547 Change-Id: I513cdbfda962f00079e886b7a42f9928e81f6474
-
Marco Nelissen authored
so we can dlopen the libraries that are there Test: build&run Merged-Id: Ia1fa1fd65295cffe6c8a3d31db53bd3339a71855 Change-Id: Ia1fa1fd65295cffe6c8a3d31db53bd3339a71855
-
Yi Jin authored
Bug: 64222712 Test: manual Change-Id: Ica77ae3c9e535eddac9fccf11710b0bcb3254ab3
-
Tri Vo authored
-
Tom Cherry authored
-
Eino-Ville Talvala authored
-
Max Bires authored
getattr for trace_data_file:dir permissions was missing, impacting functionality. Bug:68126425 Test: Traceur functionality is properly working Change-Id: I2c8ae5cf3463a8e5309b8402713744e036a64171
-
Treehugger Robot authored
-
Tri Vo authored
And grant appropriate permissions to more granular types. Bug: 29319732 Bug: 65643247 Test: adb bugreport; no new denials to /proc or /sys files. Change-Id: Ied99546164e79bfa6148822858c165177d3720a5
-
Treehugger Robot authored
-
Eino-Ville Talvala authored
Test: atest cts/tests/camera/src/android/hardware/camera2/cts/IdleUidTest.java Change-Id: Id9adcec4db2e55f2e41ebd1b018ebc40aa0be404
-
- Jan 22, 2018
-
-
Steven Moreland authored
Now that init no longer uses it. Fixes: 70846424 Test: no neverallows tripped Change-Id: I5c22dd272b66fd32b4758c1dce659ccd98b8a7ba
-
Max Bires authored
Fixing denials that stopped traceur from being able to write to debugfs_tracing. Also cleaning up general find denials for services that traceur doesn't have permission to access. Additionally, labeling /data/local/trace as a trace_data_file in order to give traceur a UX friendly area to write its traces to now that it will no longer be a shell user. It will be write/readable by traceur, and deletable/readable by shell. Test: Traceur functionality is not being blocked by selinux policy Bug: 68126425 Change-Id: I201c82975a31094102e90bc81454d3c2a48fae36
-
Steven Moreland authored
This util allows init to turn off the screen without any binder dependencies. Bug: 70846424 Test: manual + init use Change-Id: I4f41a966d6398e959ea6baf36c2cfe6fcebc00de
-
Tom Cherry authored
These property sets will be long term restricted with compatible_property but allowing them now eases the transition. Bug: 62875318 Test: boot marlin without audits for setprop in vendor_init Change-Id: I25ab565bbf137e382c1dfc3b905b38403645f1d2
-
Paul Crowley authored
-
Treehugger Robot authored
-
Yin-Chia Yeh authored
Change-Id: I37695d6c952b313e641dd145aa1af1d02e9cc537
-
- Jan 20, 2018
-
-
Tri Vo authored
-
Badhri Jagan Sridharan authored
Sepolicy for the usb daemon. (ag/3373886/) Bug: 63669128 Test: Checked for avc denial messages. Change-Id: I6e2a4ccf597750c47e1ea90c4d43581de4afa4af
-
Tri Vo authored
Bug: 65643247 Test: walleye boots with no denials from priv_app. Change-Id: I9a7faf1253bdd79d780c2398c740109e2d84bc63
-
Tri Vo authored
Bug: 65643247 Test: manual Test: browse internet Test: take a picture Change-Id: I9faff44b7a025c7422404d777113e40842ea26dd
-
Treehugger Robot authored
-
- Jan 19, 2018
-
-
Tao Bao authored
system_update service manages system update information: system updater (priv_app) publishes the pending system update info through the service, while other apps can read the info accordingly (design doc in go/pi-ota-platform-api). This CL adds the service type, and grants priv_app to access the service. Bug: 67437079 Test: Build and flash marlin image. The system_update service works. Change-Id: I7a3eaee3ecd3e2e16b410413e917ec603566b375
-
Jeff Vander Stoep authored
"/n" --> "\n" Fixes: 72225980 Test: build (this is a build test) Change-Id: Iffd7241b4d7b9b429fff34dc2e25baad32d8008d
-
Paul Crowley authored
Bug: 63927601 Test: Enable metadata encryption in fstab on Taimen, check boot success. Change-Id: Id425c47d48f413d6ea44ed170835a52d0af39f9f
-
Yifan Hong authored
-
Daniel Rosenberg authored
Test: esdfs should be mountable and usable with selinux on Bug: 63876697 Change-Id: I7a1d96d3f0d0a6dbc1c98f0c4a96264938011b5e
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Yifan Hong authored
Test: boots Test: hwservicemanager can read these files Bug: 36790901 Change-Id: I0431a7f166face993c1d14b6209c9b502a506e09
-
Badhri Jagan Sridharan authored
Bug: 63669128 Test: Checked for avc denail messages. Change-Id: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda Merged-In: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
-
Tri Vo authored
-
Yao Chen authored
Selinux violations while calling dump() on statsd by bugreport. avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1 denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1 avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 Test: manual Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jaekyun Seok authored
-
Treehugger Robot authored
-