- Jun 22, 2017
-
-
Dan Cashman authored
Bug: 37896931 Test: none, just prebuilt update. Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
-
TreeHugger Robot authored
-
Tomonori Nanbu authored
Merge "Add sepolicy for hal_wifi to access /proc/modules" am: 6acd70b9 am: ded0b58d am: 9d86e622 am: b9621bba Change-Id: I001be0f05e59e55dcedb159ec86a5bf386fa89c7
-
Tomonori Nanbu authored
am: 9d86e622 Change-Id: Ib83f52f4dae096d42dedf17898cf20d8c3923f2e
-
Tomonori Nanbu authored
am: ded0b58d Change-Id: I574e60486bb12214e33a8e9aabf7794d4ebc0b1a
-
Tomonori Nanbu authored
am: 6acd70b9 Change-Id: Ia4a4ffdf43cb1641785e18f9aad7ca96b5d45ab9
-
Treehugger Robot authored
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: 65ffb065 am: bc6271bc Change-Id: I2915ce7ffa3f11d07c26a32b2d9b2d463a3c21f4
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: ed27bec5 am: 9f5801de Change-Id: I5861f5464762ddea8c6a39cb3968d73017d9767d
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: 65ffb065 Change-Id: I4b3f0207400200d19f8e055ec35d518f0951d235
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: ed27bec5 Change-Id: Idac884677a3304144801a4929651c1ba1199a8b8
-
Sandeep Patil authored
am: 0e0ed156 Change-Id: I8ec0c46355507e8c1a7d10c53805eb350ebbe6a5
-
Sandeep Patil authored
am: 0e0ed156 Change-Id: Ic73d84dacc95d5b902dc6c9530b98e53d71574f1
-
TreeHugger Robot authored
-
- Jun 21, 2017
-
-
Dan Cashman authored
This reverts commit 3e307a4d. Test: Builds - neverallow change only. Bug: 62806062 Change-Id: Id3aa1b425cf48fc8586890c9850a74594584922d
-
Jeff Vander Stoep authored
Merge "Exempt tetheroffload hal from network socket restrictions" into oc-dev am: 6351c374 am: 319d7099 am: b24567f4 Change-Id: Ib51077433505dfb09c9a4519235ab3b51f22d149
-
Jeff Vander Stoep authored
Merge "Exempt tetheroffload hal from network socket restrictions" into oc-dev am: 6351c374 am: d9301ac6 am: aae5c4c8 Change-Id: Id94e113b5a5621b39420294eec1e7fd9e1bc1c42
-
Jeff Vander Stoep authored
am: 319d7099 Change-Id: Ifcb3c7111dbb840041d1244caa6afebfbeb1cde7
-
Jeff Vander Stoep authored
am: d9301ac6 Change-Id: I4b272a59a7e48e1f0f15ddd1acb7e8f6b836ca40
-
Jeff Vander Stoep authored
am: 6351c374 Change-Id: I6e661aa37702c36e9003dcf41dbed4b754122c87
-
Jeff Vander Stoep authored
am: 6351c374 Change-Id: I16cbe7b654532367829a0df2dcfa929c38e547fd
-
TreeHugger Robot authored
-
Sandeep Patil authored
This reverts commit 57e9946f. Bug: 62616897 Test: choosecombo 1 aosp_arm64_ab userdebug; m -j 80 The build should not break. Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Dan Cashman authored
am: e51e6131 Change-Id: I153a14af008e52fbe6677007e0e1ad4e472be3da
-
Dan Cashman authored
am: 11dcf197 Change-Id: I96b2af315b4c35ddd47315f3ca4a9b098eab1d59
-
Dan Cashman authored
am: 317c4171 Change-Id: I418cc929f8e0a698220e0b8b1c51314ef9ea52a8
-
Dan Cashman authored
am: 044d2072 Change-Id: Ia6f8a806adae230df50f8d06edcf4ba9d2ae4352
-
Dan Cashman authored
am: 3e307a4d Change-Id: Ic144d924948d7b8e73939806d761d27337dbebef
-
Dan Cashman authored
am: 3e307a4d Change-Id: I90e567c8138fa75bf792af181890d0af627b6f48
-
Jeff Vander Stoep authored
The tetheroffload hal must be able to use network sockets as part of its job. Bug: 62870833 Test: neverallow-only change builds. Change-Id: I630b36340796a5ecb5db08e732b0978dd82835c7
-
Dan Cashman authored
Same-process HALs are forbidden except for very specific HALs that have been provided and whitelisted by AOSP. As a result, a vendor extension HAL may have a need to be accessed by untrusted_app. This is still discouraged, and the existing AOSP hwservices are still forbidden, but remove the blanket prohibition. Also indicate that this is temporary, and that partners should expect to get exceptions to the rule into AOSP in the future. Bug: 62806062 Test: neverallow-only change builds. Verify new attribute is in policy. Change-Id: I6d3e659147d509a3503c2c9e0b6bb9016cc75832
-
- Jun 20, 2017
-
-
Yabin Cui authored
This is to Allow commands like `adb shell run-as ...`. Bug: http://b/62358246 Test: run commands manually. Change-Id: I7bb6c79a6e27ff1224a80c6ddeffb7f27f492bb2 (cherry picked from commit 1847a38b)