- Jul 23, 2020
-
-
Linux Build Service Account authored
Change-Id: Ie3d39dd0b5656adac6011aab1b21ea6f83ac55f8
-
- Jul 09, 2020
-
-
Change-Id: I7e60945d867a8e29bca7daa9d084bd604651f43a
-
- Jul 07, 2020
-
-
Eric Arseneau authored
This reverts commit 4ee80893. Change-Id: Icdc148682d4b5fc574365fabfe127f99f3aad5cc
-
- Jun 10, 2020
-
-
Eric Arseneau authored
Change-Id: I74d65613dcf4f3089b8afae8b6ebf31485e4b5e8
-
- Apr 23, 2020
-
-
Linux Build Service Account authored
Change-Id: I0a21f29a86b9a510cd04556d299c390126366067
-
- Apr 10, 2020
-
-
Change-Id: I9952118ad35080dfd83230368c563a430a85ef82
-
- Apr 01, 2020
-
-
Jose Galmes authored
Change-Id: Iab3689e21da6955e51bbabe841924091f3e639a5
-
- Mar 30, 2020
-
-
android-build-team Robot authored
Change-Id: Ib923cecdadf14e40643cf0b19563671360b2a356
-
Tao Bao authored
This CL addresses the following denial, when vendor_misc_writer tries to read DT fstab (i.e. device tree fstab) for /misc entry. avc: denied { search } for comm="misc_writer" name="android" dev="sysfs" ino=17456 scontext=u:r:vendor_misc_writer:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir DT fstab was used for devices shipped prior to Q, for early-mounting partitions (e.g. /system, /vendor, /product), which has been disallowed for Q launch devices. vendor_misc_writer is a new module added since Q, so it doesn't need to worry about the legacy code path; in practice there's no benefit of putting /misc entry into DT fstab either. Bug: 134122603 Bug: 152718206 Test: Build and flash taimen with the change that enables vendor_misc_writer. Check that it no longer gives the above denial during boot. Change-Id: Id2fb206706f7cd19a4cde2701e4155bfc03f01b4
-
- Mar 23, 2020
-
-
android-build-team Robot authored
Change-Id: Ia4da3d010c3fa0a44b6362e502f6564980444257
-
- Mar 21, 2020
-
-
Steven Thomas authored
Bug: 147233255 Bug: 136592946 Bug: 138261472 Test: Ran with the patch applied, confirmed surface flinger can access the system property. Change-Id: I259a488399c5e698de384322852ea81ea1a96e7d Merged-In: I259a488399c5e698de384322852ea81ea1a96e7d Exempt-From-Owner-Approval: Approved internally
-
- Mar 14, 2020
-
-
Linux Build Service Account authored
Change-Id: Id0ace2774773669e46960339e3f5f77607bedc3f
-
- Mar 12, 2020
-
-
android-build-team Robot authored
Change-Id: I30b3cf572220a2c5af68a4de570f3ef5b8c003c6
-
Jeff Vander Stoep authored
Apps can cause selinux denials by accessing CE storage and/or external storage. In either case, the selinux denial is not the cause of the failure, but just a symptom that storage isn't ready. Many apps handle the failure appropriately. These denials are not helpful, are not the cause of a problem, spam the logs, and cause presubmit flakes. Suppress them. Bug: 145267097 Bug: 151188413 Test: build Merged-In: If87b9683e5694fced96a81747b1baf85ef6b2124 Change-Id: If87b9683e5694fced96a81747b1baf85ef6b2124
-
- Mar 07, 2020
-
-
android-build-team Robot authored
Change-Id: I8047a251c85607b63b214c76789802605da9bfce
-
- Mar 05, 2020
-
-
Orion Hodson authored
New properties are: dalvik.vm.dex2oat-cpu-set [default compiler thread affinity] dalvik.vm.boot-dex2oat-cpu-set [compiler thread affinity for boot] dalvik.vm.image-dex2oat-cpu-set [thread affinity recompiling the boot image] Bug: 141446571 Bug: 149395059 Test: Run installd tests with new properties defined in target mk file. Change-Id: Idcbb1332aa9c18f6082b827eae0334d063644a41 (cherry picked from commit 7b2ee48cd2c751661c21b9c498a57da7ba6daf50)
-
- Feb 26, 2020
-
-
Change-Id: Ib3541fa959c9569f41b7529df6e49b7d0922c3a1
-
- Feb 13, 2020
-
-
android-build-team Robot authored
Change-Id: Id05dd4a11e62b70de35cdda22b39dd425bbd5654
-
- Feb 11, 2020
-
-
Alex Hong authored
This updates 29.0 api for dumpstate restart control property contexts Bug: 147730517 Change-Id: I0aa7450dc0fb34de321cf8d2ba357b2ecabbcf43
-
- Feb 10, 2020
-
-
Wei Wang authored
http://aosp/678384 changed property format Fixes: 137695210 Bug: 147730517 Test: inject timeout and take BR see dumpstate restarted Change-Id: Ie24e2d42e92410a935ca4c9364b476d72aa459f3 Merged-In: Ie24e2d42e92410a935ca4c9364b476d72aa459f3 (cherry picked from commit 046c5104021ffc5dacb89e1d3a7299e172ad95fd)
-
- Feb 02, 2020
-
-
android-build-team Robot authored
Change-Id: Ia85f8afbff172433e3af6d67ae53531a2d94c57b
-
- Feb 01, 2020
-
-
Jaegeuk Kim authored
-
- Jan 31, 2020
-
-
Jaegeuk Kim authored
Init.rc requires to limit max discard to avoid long latencies. CRs-Fixed: 2610298 Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com> (cherry picked from commit a47abdbe1658f0fd959b3c7c024b79182f2768ac)
-
- Jan 23, 2020
-
-
Jaegeuk Kim authored
Init.rc requires to limit max discard to avoid long latencies. Bug: 148209614 Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99 Merged-In: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- Jan 18, 2020
-
-
android-build-team Robot authored
Change-Id: I9cbbb5de9cc86023371c135e5fe142cc17dcafd5
-
Linux Build Service Account authored
Change-Id: Ifc609cced2640c473c1ee91a47027d2a06dfe765
-
- Jan 17, 2020
-
-
TreeHugger Robot authored
-
android-build-team Robot authored
Change-Id: Icb6faaaafd944d39e9a3f487ac4020a0e77c4a9b
-
- Jan 16, 2020
-
-
Changyeon Jo authored
Bug: 128345139 Test: make selinux_policy Change-Id: I477d6d94c16974f23f703d5f334ef108279ab3bb Signed-off-by:
Changyeon Jo <changyeon@google.com> (cherry picked from commit cfeaa1c664afbd10c7a52e845ec4c08c9eabb525)
-
- Jan 15, 2020
-
-
Jeff Vander Stoep authored
Bug: 124466646 Test: build Change-Id: Ib4868826eb153543c65503bfb4d3623c4158ffae (cherry picked from commit 29b76e2ceec2ab1e04715657a79b6544afdf09c9)
-
- Jan 14, 2020
-
-
android-build-team Robot authored
Change-Id: If0e65804d2442eaffac1488032789d1b7a6966ab
-
- Jan 12, 2020
-
-
android-build-team Robot authored
Change-Id: I273fc16913682a13804adbe627adcb66e592ba7a
-
- Jan 11, 2020
-
-
android-build-team Robot authored
Change-Id: Ibb6bb876e5f33517d6f82562648394afcaad7d25
-
TreeHugger Robot authored
-
- Jan 10, 2020
-
-
Hector Dearman authored
Currently shell can connect to the traced_consumer_socket allowing it to configure/start/stop and collect traces. This allows a host tool (e.g. Android Studio or https://ui.perfetto.dev) to connect to the device via adb and collect traces. It would be better if rather than executing shell commands the host tool could directly communicate with the consumer socket. This is possible using adb forward: adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer However in this case adbd is connecting to the socket - not shell. This CL allows adbd to connect to the socket which allows host tools to collect traces without having to do everything though shell commands. Note that this patch also has additional change on prebuilts in order to backport. Denial: 08-30 11:28:05.809 10254 10254 W adbd : type=1400 audit(0.0:1129): avc: denied { write } for name="traced_consumer" dev="tmpfs" ino=6719 scontext=u:r:adbd:s0 tcontext=u:object_r:traced_consumer_socket:s0 tclass=sock_file permissive=0 Test: Cherry pick CL to master, make, flash adb logcat | grep denied adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer Bug: b/139536756 Change-Id: Ie08e687c0b06d0e1121009e8cd70319a8f907ae2 (cherry-picked from commit b56a49d979c228400abaae849e9df95d0c834f51)
-
android-build-team Robot authored
Change-Id: I0a27ceac7adedd2342886ebc3efd6db7e1ddfa87
-
Yiwei Zhang authored
This reverts commit 6daec462. Reason for revert: b/147458874 Bug: 132402890 Test: build passes on coral-userdebug Change-Id: Ibcbc06e99561be424aa953e62985abb5b5864c56
-
Yiwei Zhang authored
This reverts commit 979f5a44. Reason for revert: b/147458874 Change-Id: Id8a9d7e50dbd3f293e01ab6277e9e54a8ed7619d
-
- Jan 09, 2020
-
-
Yiwei Zhang authored
Bug: 132402890 Test: adb bugreport and verify dumpsys gpu is included. Change-Id: Ib145937889f9616a0dcdabb7b58839fb715bf6c3
-
- Dec 25, 2019
-
-
Change-Id: Ieb1263e71336d628f5ded3b95af9cd122c8bb955
-