- Jul 18, 2018
-
-
Todd Poynor authored
This hwservice isn't registered with hwservicemanager but rather passed to the thermal hal, so it doesn't need sepolicy associated with it to do so. Test: manual: boot, inspect logs Test: VtsHalThermalV1_1TargetTest Bug: 109802374 Change-Id: Ifb727572bf8eebddc58deba6c0ce513008e01861 Merged-In: Ifb727572bf8eebddc58deba6c0ce513008e01861 (cherry picked from commit c6afcb7f)
-
Todd Poynor authored
Avoids subsequent merge conflicts in this section of the file. Test: manual: compile Change-Id: I9af723dccff54039031dc4d8f3e5ee34be5960d1 Merged-In: I9af723dccff54039031dc4d8f3e5ee34be5960d1 (cherry picked from commit 66825305)
-
Tri Vo authored
BUG: None Test: I solemnly swear I tested this conflict resolution. Change-Id: I58fff9dc7826eb60520b087d08ecd931cba63bf0
-
Tri Vo authored
-
- Jul 17, 2018
-
-
Steven Thomas authored
am: 663a827b Change-Id: Icc345eda8c645065cc30f14fe4d3de07ba888c25
-
Treehugger Robot authored
-
Tri Vo authored
Bug: n/a Test: n/a Change-Id: I11e6baaa45bcb01603fc06e8a16002727f4e5a00
-
Josh Gao authored
Test: debuggerd -j `pidof system_server` Change-Id: I6cca98b20ab5a135305b91cbb7c0fe7b57872bd3
-
Yifan Hong authored
Test: perfprofd tests Bug: 110890430 Change-Id: I0f7476d76b8d35b6b48fe6b77544ca8ccc71534d
-
- Jul 14, 2018
-
-
Steven Thomas authored
Add selinux policy for the new Binder-based vr flinger vsync service. Bug: 72890037 Test: - Manually confirmed that I can't bind to the new vsync service from a normal Android application, and system processes (other than vr_hwc) are prevented from connecting by selinux. - Confirmed the CTS test android.security.cts.SELinuxHostTest#testAospServiceContexts, when built from the local source tree with this CL applied, passes. - Confirmed the CTS test android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules521, when built from the local source tree with this CL applied, passes. Change-Id: Ib7a6bfcb1c2ebe1051f3accc18b481be1b188b06
-
- Jul 13, 2018
-
-
Yifan Hong authored
am: 6397d7e0 Change-Id: I88c793acd19ce05e275d6f2883f90540f37d52b6
-
Treehugger Robot authored
* changes: vold: not allowed to read sysfs_batteryinfo full_treble: coredomain must not have access to sysfs_batteryinfo
-
- Jul 12, 2018
-
-
Yifan Hong authored
It doesn't need to read batteryinfo to function properly. Bug: 110891415 Test: builds and boots Change-Id: I7f388180a25101bfd0c088291ef03a9bf8ba2b2c
-
Yifan Hong authored
... but should do it via health HAL and healthd. Bug: 110891415 Test: builds Change-Id: Ib124f82d31f1dfbe99a56475dba04a37f81bdca3
-
- Jul 11, 2018
-
-
Aalique Grahame authored
am: 280c6afa Change-Id: I879d46d8e004a4ea63c1b131cdb5348e90adca0d
-
Treehugger Robot authored
-
Florian Mayer authored
am: 7d7328b8 Change-Id: I6bd14e069dd07b81b6cf33cfe8dd22e641d8f1f9
-
Treehugger Robot authored
-
- Jul 03, 2018
-
-
Aalique Grahame authored
Add new sepolicy rules to support audio system properties Bug: 110564278 Change-Id: If774a40b50e56f9e83bcb4ab8a84581dc03058ad
-
Anton Hansson authored
am: 43a0a8e1 Change-Id: Iba96f0b88256b7549eb1278bdf87e65bca041594
-
Anton Hansson authored
-
Anton Hansson authored
Create one _system and one _nonsystem target, which together contains the same artifacts as before, just split by whether they go on the system partition or not. The product build hierarchy is being refactored to be split by partition, so these targets facilitate inclusion of just the system parts where necessary. Also keep the selinux_policy target around for products that don't need the split. Bug: 80410283 Test: for t in eng userdebug user; do lunch mainline_arm64-${t}; m nothing; done Test: verified walleye /system and /vendor identical before and after, via: Test: /google/data/rw/users/cc/ccross/bin/compare-target-files.sh P6259983 walleye-userdebug "SYSTEM/*" "VENDOR/*" Test: only diffs are in build.prop files (timestamps and the like) Change-Id: I0f5d8a1558a164ce5cfb7d521f34b431855ac260
-
Florian Mayer authored
Bug: 110900684 Change-Id: I9fd141e0d56d0135c563467b7ca2f08b6af6700b`
-
Bowgo Tsai authored
am: 589dbe14 Change-Id: Ife838a971f7145583d2d1444a2c366515060e5a4
-
Pawin Vongmasa authored
am: 48f1c4ce Change-Id: I9362732c00cf9daf4b68f30885664a000dd0f3b8
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Jul 02, 2018
-
-
Yabin Cui authored
-
Yongqin Liu authored
am: 8a8d4ef5 Change-Id: Ib48576d7f47811870661e0bb66cebad0f26a6782
-
Yabin Cui authored
Export /proc/sys/kernel/perf_cpu_time_max_percent and /proc/sys/kernel/perf_event_mlock_kb in proc_perf. So they can be read in shell and written by init. This is needed by simpleperf to control cpu percent and memory used for profiling. Bug: 110706031 Test: build and boot hikey960 successfully. Change-Id: I2a01f583508003ab73427bab30a7982a27dfa677
-
Yongqin Liu authored
This should be supplement for the change here: https://android-review.googlesource.com/c/platform/system/sepolicy/+/708638 When test the cts libcore.libcore.io.OsTest#test_socketPing test case, it will fail with avc denial message like following: [ 1906.617027] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 [ 1906.617189] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 [ 1906.617206] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 [ 1906.617313] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 [ 1906.617330] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 [ 1907.832425] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1 Test: run cts -m CtsLibcoreTestCases -t libcore.libcore.io.OsTest#test_socketPing Change-Id: If41cb804292834b8994333f170d1f7f837bcd7df Signed-off-by:
Yongqin Liu <yongqin.liu@linaro.org>
-
Pawin Vongmasa authored
Test: adb logcat | grep "Wrong interface type." Bug: 77924251 Change-Id: Idf9d7ae6db0d41bb0c2f94b2183bfe23f0c21155
- Jun 30, 2018
-
-
Todd Poynor authored
am: c6afcb7f -s ours Change-Id: I9c89b5179d68943f4e090fbd596b4cd4be68100f
-
- Jun 29, 2018
-
-
Todd Poynor authored
This hwservice isn't registered with hwservicemanager but rather passed to the thermal hal, so it doesn't need sepolicy associated with it to do so. Test: manual: boot, inspect logs Test: VtsHalThermalV1_1TargetTest Bug: 109802374 Change-Id: Ifb727572bf8eebddc58deba6c0ce513008e01861 Merged-In: Ifb727572bf8eebddc58deba6c0ce513008e01861
-
Jeff Vander Stoep authored
am: 05fc3f25 Change-Id: Iebf4303790c7b87cd9e82abf073c895f7b4fa38e
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Suppress selinux logspam for non-API files in /sys. Bug: 110914297 Test: build Change-Id: I9b3bcf2dbf80f282ae5c74b61df360c85d02483c
-