- Dec 14, 2016
-
-
Nick Kralevich authored
am: 5bfa8509 Change-Id: Idb6a5e42bff4bab0781db7bad1a497e9b2c169e5
-
Nick Kralevich authored
am: f13dcbb4 Change-Id: Ife8946bdd99b4121b6ad80a21c345d9ee0af1777
-
Nick Kralevich authored
am: d57dd813 Change-Id: I5e911f7d301ba8421184b80f485e043178f225fb
-
Treehugger Robot authored
-
Nick Kralevich authored
core_property_type is an attribute which was given to all existing properties known to core SELinux policy. Any property with this label is readable to all SELinux domains, which is overly broad. The long term goal is to remove the core_property_type attribute entirely. Add a neverallow rule prohibiting the introduction of new properties with the core_property_type attribute. Device specific properties, or new properties in core SELinux policy, should not have this attribute. Test: policy compiles Change-Id: Ie89a9f0d81c8561616001ff8451496ce2278dbb2
-
- Dec 13, 2016
-
-
Connor O'Brien authored
am: 5f50fd90 Change-Id: I643d05381fd866f43717dc37b55ad5beb589a2bc
-
Connor O'Brien authored
am: 7724c229 Change-Id: I6e4ad94ec694f96c4685f33be090ce479a87b0fd
-
Max authored
There is no reason for vold to have this permission, and a proper auditallow rule has been used and monitored to ensure that nothing on android uses this permission. Bug: 26901147 Test: Phone boots Change-Id: Id36ed2722348f433fe3d046a3429066338230fec
-
Connor O'Brien authored
am: a95c52e3 Change-Id: Ibf4f702d4b7d1f86baa7550b8b76bb3b30aa81ca
-
Connor O'Brien authored
Test: logging confirms service runs on boot Change-Id: If86fa7daf4a626b3e04fa0d2677d4cb590eb71ce Signed-off-by:
Connor O'Brien <connoro@google.com>
-
Treehugger Robot authored
-
dcashman authored
Simulate platform and non-platform split by sending the split files to the device to be compiled by init. Bug: 31363362 Test: Policy builds on-device and boots. sediff shows no difference. Change-Id: I9627d1c66ca37786d97a049666278a4992ad7579
-
Jeff Sharkey authored
am: 2bb33d81 Change-Id: I418745d1eb9f855a727dab2873a7aa2e52b7e3dd
-
Jeff Sharkey authored
am: a018b183 Change-Id: I34dfe5ee2a0e320276b69bc2ac407c46954e6237
-
Jeff Sharkey authored
am: 52da39d9 Change-Id: I7ebc5532d1047726472d9078ceba0fd755130593
-
Jeff Sharkey authored
The new domain wasn't fully tested, and it caused many regressions on the daily build. Revert back to using "priv_app" domain until we can fully test and re-land the new domain. Temporarily add the USB functionfs capabilities to priv_app domain to keep remainder of MtpService changes working; 33574909 is tracking removing that from the priv_app domain. Test: builds, boots, verified UI and downloads Bug: 33569176, 33568261, 33574909 Change-Id: I1bd0561d52870df0fe488e59ae8307b89978a9cb
-
Roshan Pius authored
am: 5dacc9cb Change-Id: I8bb9ef7f143f408a55c26ca5ba1d3699af49f3f7
-
Roshan Pius authored
am: e2cebbee Change-Id: I0edbcbf847ea08466a4e8bc0c3fb23c88c991e5e
-
Roshan Pius authored
am: 3a78d30b Change-Id: Ie058e8370da10aa8124b6e2017a23a8f18804f80
-
Roshan Pius authored
am: 7bd89fbc Change-Id: I57c4e27a7df0a9da8056f03d410952b0c54402a1
-
Roshan Pius authored
am: 84b299d2 Change-Id: I9f7a7c57926eb6f51ace0da458a0ac8d9316e9b2
-
Roshan Pius authored
am: 7f1b8ad8 Change-Id: I651a93f9363fbe73d47912fcb6c856f76bae5359
-
Roshan Pius authored
am: 0a807828 Change-Id: I77fd598970f1f4ab8c5b469405b6d3140b1b8dfd
-
Roshan Pius authored
am: 85e3e7d6 Change-Id: I875f2ac6a830fec679b8f2ea4fc22a65faed4a6e
-
Roshan Pius authored
am: 02ed21e8 Change-Id: Ibc02afe12c386abaaa1c96ea025a1bf720f30280
-
Jerry Zhang authored
Merge "Move MediaProvider to its own domain, add new MtpServer permissions" am: 35aa81ad am: be818286 am: a8063522 Change-Id: I46dd432a3b26b978b1f5774c206f75ae1c2e6096
-
Jerry Zhang authored
am: be818286 Change-Id: I4471da7b5c31bc3deace4d57e66bdb11f16da7a5
-
Treehugger Robot authored
* changes: hal_wifi: Allow HAL to reload wifi firmware hal_wifi: Allow system_server to access wifi HIDL services
-
Jerry Zhang authored
am: 35aa81ad Change-Id: Ica2ee9f242334f90d100e2a0e64b01663f3b9cc2
-
Jerry Zhang authored
-
- Dec 12, 2016
-
-
Daniel Rosenberg authored
am: c69bb0fe Change-Id: I895a471d89491f31d51cde5ab17a16a9ada5b808
-
Daniel Rosenberg authored
am: e7bacff2 Change-Id: Ie6a0335e4c4c80dcb410681654ab7ae1aad1ee8d
-
Daniel Rosenberg authored
am: 02bf4aad Change-Id: Ic17d83f2b937c756275e81d8f4b654b00d958ef2
-
Daniel Rosenberg authored
Sdcardfs does not use a userspace daemon, so the secontext is currently the caller's when accessing files. This can be removed if sdcardfs is modified to change the secontext before calling into the lower filesystem. Bug: 32735101 Test: Run any app that falls under isolated_app. Test: See bug for example Change-Id: I9433aa0f14ff0d5a518249079e07f57e55b09bcf
-