- Jan 18, 2017
-
-
Janis Danisevskis authored
This adds the premissions required for android.hardware.keymaster@2.0-service to access the keymaster TA as well as for keystore and vold to lookup and use android.hardware.keymaster@2.0-service. IT DOES NOT remove the privileges from keystore and vold to access the keymaster TA directly. Test: Run keystore CTS tests Bug: 32020919 Change-Id: I9467ee29232cc54b48a6dae8ae240656999f73bf
-
Sandeep Patil authored
Merge "property_context: split into platform and non-platform components." am: ccbf463a am: 88b4a532 am: 5c68562b am: 2ff687d7 Change-Id: I7743e6f61752125dacf930fcb83eae79668a0a37
-
Sandeep Patil authored
property_context: split into platform and non-platform components. am: 262edc38 am: af8c60fe am: a9aeef03 am: e796428f Change-Id: I3339566f978993a150bb85f53f4e2a2041a6a6a3
-
Sandeep Patil authored
Merge "property_context: split into platform and non-platform components." am: ccbf463a am: 88b4a532 am: 5c68562b Change-Id: I5eb3d5448a99ffc6fa753c332679339490fb6456
-
Sandeep Patil authored
am: a9aeef03 Change-Id: Idb3889f9a3ee16ecc59e790a8015a2b80de296cf
-
Sandeep Patil authored
am: 88b4a532 Change-Id: I1b77dda37eb5f5598fb676992624a10d50124461
-
Sandeep Patil authored
am: af8c60fe Change-Id: I542204a3c6dc4395918b3cf379c4076dbaffbdcb
-
Sandeep Patil authored
am: ccbf463a Change-Id: I018d3fc1f782b6d689c4231e5a2a350ea97a11cd
-
Sandeep Patil authored
am: 262edc38 Change-Id: If843833a2fb22b92949b47a33bbd88777f4a54e5
-
Daichi Hirono authored
am: 93f38cb5 Change-Id: Icbd77e282cf09ad1a55c377e6586cb7119edcab7
-
Daichi Hirono authored
am: 4b7c1d52 Change-Id: Ib4ea82b1433d88ddcc1b977b35cab3d1cc4d1500
-
Treehugger Robot authored
-
Daichi Hirono authored
am: f702933a Change-Id: I873f07ec888a8b225ac3252208820dc0b5c8eac8
-
Daichi Hirono authored
am: 7ae1d237 Change-Id: Ic4a3c4df6966182cd133e4ba3f3dd89b8da84bfe
-
Daichi Hirono authored
Previously we published appfuse mount points to apps and apps open appfuse file by themselves. We changed the design and we don't allow apps to access appfuse mount point. Instead system server opens a file on appfuse mount points and passes FD to apps. The change updates apps and system server policies to adopt new design. Bug: 29970149 Test: None Change-Id: I0b35fee9816f61565705eecb88a472754ccffdca
-
Jeff Sharkey authored
am: 0f1a97c5 Change-Id: Ie29f67b5bd8cbcdebe0ca67fa34c337cdd962714
-
Jeff Sharkey authored
am: 955aa7aa Change-Id: Iec426c8506d4c1c29d69cceb6b4dc95eac6e4a17
-
Jeff Sharkey authored
am: 7b88514c Change-Id: I2826bd3129b43a11137c1cd8cb9bbdd0141cc3fe
-
Jeff Sharkey authored
am: 828433c8 Change-Id: I60de6b63d1029afa3546f1f45dc5fedf45e188e4
-
Jeff Sharkey authored
New procfs file written by the system_server to communicate fg/bg state of UIDs to switch the statistics counter sets used. avc: denied { write } for name="set" dev="proc" ino=4026531862 scontext=u:r:system_server:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1 Test: builds, boots, counter sets updated Bug: 34360629 Change-Id: I2efbfbba9e73f50ce50a80a3dffd3b14fa55c048
-
Alex Klyubin authored
am: 0181fea9 Change-Id: Ia14a74cd5bc38036185b0002c58313be7c0284e9
-
Sandeep Patil authored
service_context: split into platform and non-platform components. am: a058b569 am: 88fe61cd am: 0b0d7168 am: bfbdc901 Change-Id: Ice9d66da54f660f1882cbc5e088f96285c0cfd42
-
Alex Klyubin authored
am: 45630ee9 Change-Id: I00b4d32dd2feee3ef58abba3e7d292d74bacacd7
-
Sandeep Patil authored
am: 0b0d7168 Change-Id: Ied0b070eff73c11ef355f8d21bc20d7f92219299
-
Alex Klyubin authored
am: 379ce55b Change-Id: Ibbe9f31d2df586b12f5cda7d49ba655ede42f822
-
Sandeep Patil authored
am: 88fe61cd Change-Id: Ic18f5e03886e8e3049e9b8f2148e8dd040dd6b26
-
Alex Klyubin authored
am: fa120106 Change-Id: Ie16d45133ca244b408098b11f23fa64d8d6a3fd2
-
Sandeep Patil authored
Bug: 33746484 Test: Successfully boot with original service and property contexts. Successfully boot with split serivce and property contexts. Change-Id: I7881af8922834dc69b37dae3b06d921e05206564 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
am: a058b569 Change-Id: If71062f721f57462d6238248e77b6189669847ab
-
Alex Klyubin authored
-
Alex Klyubin authored
This improves readability and consistency for HAL implementation domains which have only one implementation. Test: No change to policy according to sesearch Test: No change to which types are associated with haldomain according to "sepolicy-analyze <sepolicy file> attribute haldomain" Bug: 34180936 Change-Id: Ice599ea4971cdfbd8b835b1fd02ad1e14c7a0386
-
Sandeep Patil authored
Bug: 33746484 Test: Successfully boot with original service and property contexts. Successfully boot with split serivce and property contexts. Change-Id: Ide67d37d85273c60b9e387e72fbeb87be6da306a Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
- Jan 17, 2017
-
-
Alex Klyubin authored
am: e9a3f744 Change-Id: I4afeccb59eaad32a16890db29fe887e70d1ab3b2
-
Alex Klyubin authored
am: bda2e5c7 Change-Id: I9dafddfa3edc7301d8b68d7bf7aa20e59ff70e08
-
Alex Klyubin authored
am: 06d17805 Change-Id: I29d2820e5be5f212b16c71df97a0ad58a03eb448
-
Alex Klyubin authored
am: f41d89eb Change-Id: I8f32e2e80fc7bfc08ce9fe3655968a8d7dfc94e8
-
Jim Miller authored
Move from fingerprintd to new fingerprint_hal and update SeLinux policy. Test: Boot with no errors related to fingerprint sepolicy Bug: 33199080 Change-Id: Ia6963cb960769ec84bc51a58133a4e9944900e5a
-
Mikhail Naganov authored
hal_audio: In binderized mode hal_audio needs access to IAllocator am: ddb52d82 am: af57c85e am: 49f86ce8 am: 9629ad88 Change-Id: I8b867f892074c0546f61b8519edf7e5a58e007b0
-
Alex Klyubin authored
This marks all HAL domain implementations with the haldomain attribute so that rules can be written which apply to all HAL implementations. This follows the pattern used for appdomain, netdomain and bluetoothdomain. Test: No change to policy according to sesearch. Bug: 34180936 Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
-
Mikhail Naganov authored
am: 49f86ce8 Change-Id: Iec0b77a8ccd9a6de7f47e219e1f0a79772768e63
-