- May 18, 2017
-
-
Howard Chen authored
am: eb02b9a0 -s ours Change-Id: I773b392db75e22161c25bc71d1fb09684f150ea5
-
Howard Chen authored
am: cf611a3b Change-Id: I4bcad7c62a3b32868cfcd6496f608c5905ab79f7
-
Howard Chen authored
am: e3be5d6b Change-Id: I6f3544a3803217bd6380ebb9d7d0b84c403e60c2
-
Treehugger Robot authored
-
- May 17, 2017
-
-
Steven Moreland authored
am: ffb8fb1b Change-Id: I4b4c521d80df2eff191ca3c0dec233f464e279e0
-
TreeHugger Robot authored
-
Steven Moreland authored
This hidl service provides information about vsync and hotplug to vendor services which is required by at least some camera hal implementations. Test: VtsFwkDisplayServiceV1_0TargetTest Test: no denials Bug: 38311538 Change-Id: I64f0321e2832facf987057f0d48940e269d8e2d9
-
Jiyong Park authored
am: a82c3d57 Change-Id: I332b2e50b5057016ad6b530f7660c95bd53af4b7
-
TreeHugger Robot authored
-
Jiyong Park authored
Currently, some jni libs in /vendor/lib are allowed to be executed in java process by labelling them as same_process_hal_file. This is wrong because those jni libs are not in fact same process HALs. After b/37481404, those jni libs for vendor apks are embedded inside the apk just like downloaded apks. In order to make this possible, appdomain is allowed to execute vendor_app_file. Note that allowing this is not a Treble violation because vendor_app_file is Java and JNI code only. Native libraries in /vendor/lib are still prevented from being loaded in apps except for those are labeled as same_process_hal_file AND are loaded via the 'sphal' namespace. Bug: 37481404 Test: Phone application does not crash. Change-Id: Ifaece2f05d0b20e28c4b1c0847f5ea0bb28ade02
-
- May 16, 2017
-
-
Jeff Vander Stoep authored
am: 02a101a6 Change-Id: I0140009cfbf316489db4994b414ac079776ead21
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
am: 125a5a0c Change-Id: I3b9bd0d3790523045db45bb1cb4a439220b7ede0
-
TreeHugger Robot authored
-
Andrew Scull authored
am: 21e6ab12 Change-Id: Ia07eb71f1c8cdd7329bdfb3315e9b2e3337b2ee0
-
Andrew Scull authored
am: f2760f79 Change-Id: Iac53bd00513b53476d9156440fd4937afcf0bd54
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Disallowing other HALs access to video_device does not appear to be enforceable. (cherry picked from commit c26dd18a) Bug: 37669506 Test: build policy. Neverallow rules are build time test and do not impact the policy binary. Change-Id: Iea401de08a63f3261a461f67b85113a9d838e88a
-
Ian Pedowitz authored
am: 0f406a7a Change-Id: I39ba184fe5b89a6cace60a4ea31f42e3e9940fce
-
Ian Pedowitz authored
-
- May 15, 2017
-
-
Jeff Vander Stoep authored
This attribute is being actively removed from policy. Since attributes are not being versioned, partners must not be able to access and use this attribute. Move it from private and verify in the logs that rild and tee are not using these permissions. Bug: 38316109 Test: build and boot Marlin Test: Verify that rild and tee are not being granted any of these permissions. Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
-
Alex Vakulenko authored
am: a06236a0 -s ours Change-Id: I78b6f59d35d5510f91bc3fb64818b13d50148850
-
Alex Vakulenko authored
am: 1a6fabea Change-Id: I3b1a74f387cbf7388feb17f87f749964816df302
-
Alex Vakulenko authored
am: c4055f0d Change-Id: I4f307d49476c1e84d8dd17d02f383d7c10a959fc
-
Alex Vakulenko authored
Specify per-service rules for PDX transport. Now being able to grant permissions to individual services provided by processes, not all services of a process. Also tighter control over which permissions are required for client and server for individual components of IPC (endpoints, channels, etc). Bug: 37646189 Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea Merged-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
-
- May 13, 2017
-
- May 12, 2017
-
-
Andrew Scull authored
Bug: 35628284 Change-Id: I08877ac117212325b1259f7d90a4c0cb1dac2d9f Fix: 38233550 Test: Build and boot Merged-In: I4cdacb601e0eea1f5f0e721c568c7ee04298704f
-
Andrew Scull authored
Bug: 34766843 Change-Id: I5be615d818ecf999fec6514ce9b89ff6a7f13cd6 Fix: 38232801 Test: Build and boot Merged-In: Ice78aedfdbe82477a84252499a76dad37887fe6b
-
Tom Cherry authored
am: 2c029ee1 Change-Id: I4ad2e5a08336f44ca8786be35e46ac7d705cb26f
-
Tom Cherry authored
am: 7469d816 Change-Id: Ie36c6266cc3387bba02974fb65614c75c8bd1425
-
Tom Cherry authored
am: fcfda81b Change-Id: Iefe805a99749c29865b7f871cd4fc3fe11e1e536
-
Siarhei Vishniakou authored
am: 45c4b142 Change-Id: I6cb948d50f22f162d4b647259d12143cff7b61de
-
Treehugger Robot authored
-
- May 11, 2017
-
-
Luke Song authored
Sensord move in ag/2106763 should be accompanied by corresponding sepolicy move of sensord-related files/declarations. Bug: 36996994 Test: Sailfish build shows no related permission errors Change-Id: Ibe41b363f7ca2752b5d3e0961298985cf784663d
-
Tom Cherry authored
This reverts commit 8c60f74d. Bug: 38242876 Change-Id: Iba5a94d16901dc0c52f1941972c26877baa4805c
-
Siarhei Vishniakou authored
am: c1e8f825 Change-Id: I2db7693bb8bb77e396602caa37286090791a4689
-
Siarhei Vishniakou authored
am: 216b377d Change-Id: I2ff6397f145424266cd1091e338323cff283397c
-
Siarhei Vishniakou authored
-
Alex Vakulenko authored
am: 7e617640 Change-Id: Idefee5498a277bd5b507e648ff41bdc02aa0d752
-