- Jun 09, 2016
-
-
Jeff Vander Stoep authored
Remove audit messaged. Addresses: avc: granted { read } for pid=1 comm="init" name="cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file avc: granted { read open } for pid=1 comm="init" path="/proc/cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file Bug: 28760354 Change-Id: I48ea01b35c6d1b255995484984ec92203b6083be
-
- Jun 07, 2016
-
-
Mark Salyzyn authored
am: 4fe2fa5f Change-Id: Ic0df405f9f8567a41f3920adf443a7bb2d42f836
-
Mark Salyzyn authored
am: 2c05530a Change-Id: I2a90a2cd5a1744f8f3fbd029d0e64a5f8c0ecedc
-
Mark Salyzyn authored
Change-Id: I66cd48a5540e5ba1b51825fe17ecd090a36f6cad
-
Mark Salyzyn authored
am: 68d67a0f * commit '68d67a0f': logpersist: reserve persist.logd.logpersistd Change-Id: Iba3e63f99619e2475404c8762821bee764657ca4
-
Mark Salyzyn authored
shell, system_app and logd access granted on debug builds only Bug: 28936216 Change-Id: Ib9648e8565cc0ea0077cf0950b0e4ac6fe0a3135
-
Mark Salyzyn authored
am: bc49cdc8 * commit 'bc49cdc8': Change-Id: I1d4dc301611422db2fb7cae87309d34bace71dea
-
Mark Salyzyn authored
am: 34782b0c * commit '34782b0c': Regression for log.tag properties Change-Id: I260b68e1b2e469560487afda9d375926e3122daa
-
Mark Salyzyn authored
am: 2fd6fdb9 * commit '2fd6fdb9': Change-Id: I0e3eaa1753d305484c2321b8fad1c2adccf8c3e6
-
Mark Salyzyn authored
am: 209378d2 * commit '209378d2': Regression for log.tag properties Change-Id: Id1d31522a703ffb02f75773dccd18cc4fd24800f
-
Mark Salyzyn authored
am: 44c98bb7 * commit '44c98bb7': Regression for log.tag properties Change-Id: I64a6651199ca387c6b7602a2ac08e9a15a5b0a05
-
Mark Salyzyn authored
am: 44c98bb7 * commit '44c98bb7': Regression for log.tag properties Change-Id: I9a386fb3d5f24491b1870d29ad82f545c350f32c
-
Mark Salyzyn authored
Allow log.tag and persist.log.tag as log_tag_prop Bug: 28942894 Change-Id: I05766b99b9535a79a39adc55cad004decd52956e
-
Ningyuan Wang authored
-
- Jun 06, 2016
-
-
Tao Bao authored
-
Andreas Gampe authored
am: b7d8bb27 * commit 'b7d8bb27': Sepolicy: Add search rights for A/B dexopt Change-Id: I0dae7b761450b12d4f294866f57a8089eb541296
-
Andreas Gampe authored
am: 9072d0dd * commit '9072d0dd': Sepolicy: Add search rights for A/B dexopt Change-Id: I2281e3f3bb278b40d74cdb7d4a3ce22113dcffdd
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Ningyuan Wang authored
This allows wificond to publish binder interface using service manager. Denial warnings: wificond: type=1400 audit(0.0:8): avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 wificond: type=1400 audit(0.0:9): avc: denied { transfer } for scontext=u:r:wificond:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 servicemanager: type=1400 audit(0.0:10): avc: denied { search } for name="6085" dev="proc" ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=dir permissive=1 servicemanager: type=1400 audit(0.0:11): avc: denied { read } for name="current" dev="proc" ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=file permissive=1 servicemanager: type=1400 audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current" dev="proc" ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=file permissive=1 servicemanager: type=1400 audit(0.0:13): avc: denied { getattr } for scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process permissive=1 SELinux : avc: denied { add } for service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0 tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1 BUG=28867093 TEST=compile TEST=use a client to call wificond service through binder Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
-
Andreas Gampe authored
More read rights are required now. Bug: 25612095 Change-Id: I766b3b56064ca2f265b9d60e532cd22712f95a42
-
David Sehr authored
am: 402032a2 * commit '402032a2': Change-Id: I9183bfe76af65ee65877fdafd596dc167219af19
-
David Sehr authored
am: c7a754a5 * commit 'c7a754a5': Enable profman pretty printing Change-Id: I446ffb1e3c503fabb1cc6b246694acebcf9e03d5
-
Android Build Merger (Role) authored
-
David Sehr authored
am: 2d4a12cb * commit '2d4a12cb': Enable profman pretty printing Change-Id: I797b2cbb9752664a5b3d6081197ccbe7a0ec7a21
-
David Sehr authored
am: 25d52d4a * commit '25d52d4a': Enable profman pretty printing Change-Id: I141bb44b8630ded2815387d17c3e6dace666d870
-
David Sehr authored
am: bb8a352f * commit 'bb8a352f': Enable profman pretty printing Change-Id: Idf7b71b405ff84fadcf0ee62624614b4a488abbf
-
David Sehr authored
am: bb8a352f * commit 'bb8a352f': Enable profman pretty printing Change-Id: I4b074239ccd92992330647be359f081570eead1d
-
Jeff Vander Stoep authored
Grant permissions observed. Bug: 28760354 Change-Id: Ifdead51f873eb587556309c48fb84ff1542ae303
-
David Sehr authored
Bug: 28748264 Change-Id: I848c448e43d48d245d998ff22547bc67a640ab96
-
Tao Bao authored
Allow priv_app, uncrypt, update_engine to access the OTA packages at /data/ota_package (both A/B and non-A/B). GMSCore (priv_app) checks the existence of the folder, and downloads the package there if present. Bug: 28944800 Change-Id: I3c0717861fce7f93b33874a99f6a4a55567612a5
-
Narayan Kamath authored
Merge "Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927" into nyc-mr1-dev-plus-aosp am: 302251cd * commit '302251cd': Change-Id: Idcd722f34483aa71d00e939b2ac8594e20596299
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: a6f1e6c5 am: 9b0aeda0 * commit '9b0aeda0': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: I46b327a9effcb1bad1be498d2ed088df096f593a
-
Android Build Merger (Role) authored
Merge "Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927" into nyc-mr1-dev-plus-aosp
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: a6f1e6c5 * commit 'a6f1e6c5': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Id3742ffeb275db5a2dfe3136b515d26718e1116b
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927 * commit '80fc2927': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Ib83dedaab25850dac45a296b809aa84be3d95562
-
Narayan Kamath authored
am: ed413a82 * commit 'ed413a82': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: If6ef21fdca0da453a6bbf2093c2704a3e72c9bcf
-
Narayan Kamath authored
am: ed413a82 * commit 'ed413a82': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Ibd428847a8292cdb47a03aadba133705f653447b
-