Skip to content
Snippets Groups Projects
  1. Mar 22, 2017
  2. Mar 21, 2017
  3. Mar 20, 2017
  4. Mar 18, 2017
    • Alex Klyubin's avatar
      Switch Boot Control HAL policy to _client/_server · 09d13e73
      Alex Klyubin authored
      This switches Boot Control HAL policy to the design which enables us
      to conditionally remove unnecessary rules from domains which are
      clients of Boot Control HAL.
      
      Domains which are clients of Boot Control HAL, such as update_server,
      are granted rules targeting hal_bootctl only when the Boot Control HAL
      runs in passthrough mode (i.e., inside the client's process). When the
      HAL runs in binderized mode (i.e., in another process/domain, with
      clients talking to the HAL over HwBinder IPC), rules targeting
      hal_bootctl are not granted to client domains.
      
      Domains which offer a binderized implementation of Boot Control HAL,
      such as hal_bootctl_default domain, are always granted rules targeting
      hal_bootctl.
      
      P. S. This commit removes direct access to Boot Control HAL from
      system_server because system_server is not a client of this HAL. This
      commit also removes bootctrl_block_device type which is no longer
      used. Finally, boot_control_hal attribute is removed because it is now
      covered by the hal_bootctl attribute.
      
      Test: Device boots up, no new denials
      Test: Reboot into recovery, sideload OTA update succeeds
      Test: Apply OTA update via update_engine:
            1. make dist
            2. Ensure device has network connectivity
            3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip
      Bug: 34170079
      Change-Id: I9c410c092069e431a3852b66c04c4d2a9f1a25cf
      09d13e73
  5. Mar 17, 2017
    • Jorge Lucangeli Obes's avatar
      Merge "ppp: Allow specific ioctls on mtp:socket." · e8acb4f6
      Jorge Lucangeli Obes authored
      am: 11ce09bc
      
      Change-Id: I8e964a15af674c16e8272fdcf3c617eb5821c64a
      e8acb4f6
    • Treehugger Robot's avatar
      11ce09bc
    • Jorge Lucangeli Obes's avatar
      ppp: Allow specific ioctls on mtp:socket. · fd21dc0e
      Jorge Lucangeli Obes authored
      The fix for b/35100237 surfaced this error. This SELinux policy
      fragment was included only on Marlin, but needs to be included in core
      policy.
      
      Bug: 35100237
      Test: With https://android-review.googlesource.com/#/c/354292/
      Test: Set up PPTP VPN using http://www.vpnbook.com/ on Marlin.
      Test: Connect:
      03-17 15:41:22.602  3809  3809 I mtpd    : Starting pppd (pppox = 9)
      03-17 15:41:22.628  3811  3811 I pppd    : Using PPPoX (socket = 9)
      03-17 15:41:22.637  3811  3811 I pppd    : pppd 2.4.7 started by vpn, uid 1016
      03-17 15:41:22.639  3811  3811 I pppd    : Using interface ppp0
      03-17 15:41:22.639  3811  3811 I pppd    : Connect: ppp0 <-->
      03-17 15:41:22.770  3811  3811 I pppd    : CHAP authentication succeeded
      03-17 15:41:22.909  3811  3811 I pppd    : MPPE 128-bit stateless compression enabled
      03-17 15:41:23.065  3811  3811 I pppd    : local  IP address 172.16.36.113
      03-17 15:41:23.065  3811  3811 I pppd    : remote IP address 172.16.36.1
      03-17 15:41:23.065  3811  3811 I pppd    : primary   DNS address 8.8.8.8
      03-17 15:41:23.065  3811  3811 I pppd    : secondary DNS address 91.239.100.100
      
      Change-Id: I192b4dfc9613d1000f804b9c4ca2727d502a1927
      fd21dc0e
Loading