- Apr 16, 2017
-
-
Martijn Coenen authored
am: b76c352e Change-Id: Ifc70c644ac582f2b3fb65a8f44a893e6626ee01f
-
Sandeep Patil authored
am: 7eac10c7 Change-Id: Idfebcf45797a9feed9fb529a104d0b7e40e5ec28
-
Martijn Coenen authored
am: f69d535c Change-Id: I19a518a9f84d17fdd7d3f7b8613d85785948187f
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 80cab7de Change-Id: Iba1cf44b3e7c965b8ea7033b80a25393730512e9
-
TreeHugger Robot authored
-
Martijn Coenen authored
The new binder_call() lines had to be added because this change removes mediacodec from binderservicedomain (on full-treble), hence domains that could previously reach mediacodec with binder_call(domain, binderservicedomain) now need explicit calls instead. Test: Youtube, Netflix, Maps, Chrome, Music Change-Id: I3325ce20d9304bc07659fd435554cbcbacbc9829
-
Sandeep Patil authored
Bug: 36463595 Test: make -j48 sepolicy Change-Id: Id8e66e3e08ceb1301c36824af93410aa84def8d3 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Martijn Coenen authored
am: 6cc5334a Change-Id: Ic465169a0ac0c04a2114a4268caae3b82a7b6706
-
Martijn Coenen authored
am: e506cda3 Change-Id: I9df35ecb00db0ed5d3a1430e64056e09579ab0a5
-
Martijn Coenen authored
-
- Apr 15, 2017
-
-
Sandeep Patil authored
am: 6a4b6c68 Change-Id: Ie9c93a313215652d22fa2bc93aeb2a468916e008
-
Sandeep Patil authored
am: acb66317 Change-Id: Ib10b8c031066507b72361e302204646d3c9f9814
-
TreeHugger Robot authored
-
Martijn Coenen authored
Test: WIP Change-Id: I678b0d0e9750b25628b86060574fd516d3749cdf
-
Jeff Vander Stoep authored
am: 405e7283 Change-Id: I6045f5edf0ef32d3001eb76a8437a2b92790cca3
-
Jeff Vander Stoep authored
am: 748cae86 Change-Id: Ia9c8f25a66ba8cf8528e80b3ce4c151f10574a6d
-
Sandeep Patil authored
Temporary attribute (checked against in CTS) to point out vendor processes that run /system executables. These are currently only down to 2-3 of them that are related to telephony on sailfish Bug: 36463595 Test: Build succeeds for sailfish Test: ./cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.security.cts.SELinuxHostTest#testNoExemptionsForVendorExecutingCore \ --skip-device-info --skip-preconditions --skip-connectivity-check \ --abi arm64-v8a Change-Id: I9eb40ad259aefba73869d6a1b40186d33fa475dd Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Bug: 36463595 Test: Boot sailfish, make wifi call, internet over data and wifi Change-Id: I81259b6412d7197725afe2fe4976aa0a03b8df6e Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Jeff Vander Stoep authored
Attributes added to the policy by the policy compiler are causing performance issues. Telling the compiler to expand these auto-generated attributes to their underlying types prevents preemtion during policy lookup. Bug: 3650825 Test: Build and boot Bullhead Change-Id: I9a33f5efb1e7c25d83dda1ea5dfe663b22846a2f
-
Martijn Coenen authored
am: d6ceae5a Change-Id: I03753dbba73acf23e557e8abdebbd45df310a9fe
-
Martijn Coenen authored
am: de2e79c5 Change-Id: Icc632129142cba968ca05206690adfef445f62c7
-
Tianjie Xu authored
Merge "Allow recovery to read thermal info on sailfish" am: 5ab5cfba am: afa8120a am: 16118451 am: d5c8c6b6 Change-Id: I5b20d4028cc1a1f9d1b3d7b9bf84109198e64781
-
Tianjie Xu authored
am: 16118451 Change-Id: I55938593a2dd5f284dd2332a3685a737acbe1aec
-
Tianjie Xu authored
am: afa8120a Change-Id: Ie7c760c3952650b5b7b60f956a0a5934a64e399f
-
Tianjie Xu authored
am: 5ab5cfba Change-Id: I1fd254e6991d4d7f9afa6e36b26cc879c73fa6da
-
Treehugger Robot authored
-
- Apr 14, 2017
-
-
Martijn Coenen authored
Since hal_graphics_composer_default is now no longer a member of binderservicedomain, these domains would no longer be able to use filedescriptors from it. Bug: 36569525 Bug: 35706331 Test: marlin boots, YouTube, Maps, Camera, video Change-Id: I4c110cf7530983470ae079e4fbc8cf11aa0fab7f
-
Tianjie Xu authored
Encountered more denials on sailfish: avc: denied { read } for pid=439 comm="recovery" name="thermal" dev="sysfs" ino=28516 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0 avc: denied { read } for pid=441 comm="recovery" name="thermal_zone9" dev="sysfs" ino=40364 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0 Bug: 36920500 Test: sideload a package in sailfish Change-Id: Ib4e89ba48cdc383318e5f3b7b15f542434e43564
-
Sandeep Patil authored
am: ff2febc0 Change-Id: Iccca8a3c2add3eecf9f8dbb1fad4ff9e3c03b534
-
Iliyan Malchev authored
am: b4aa5da9 Change-Id: Iebe2b6c646916d3ea5ef7de7a57266f39a64938f
-
Sandeep Patil authored
am: e9e11a79 Change-Id: I4afe3e0fbd9fd17d19f2e498162c9f68234a8fb5
-
Iliyan Malchev authored
am: a8c0b2d9 Change-Id: If0bae6172f3f7e5c05b4745dc7a00b890b4905e5
-
TreeHugger Robot authored
* changes: suppress audit logs from rild's access to core domain through system() sepolicy: auditallow vendor components to execute files from /system vendor_shell: add sepolicy for vendor shell toolbox: add sepolicy for vendor toybox Do not allow priv_apps to scan all exec files
-
TreeHugger Robot authored
-
Alex Klyubin authored
am: b83fc712 Change-Id: I9236e4f3cb9456e5280c38ebc6338e23a5f5b9b7
-
Alex Klyubin authored
am: 20c2d4e9 Change-Id: I0a6aeb383854eb7df3b701ff2a080cb5a12398db
-
Iliyan Malchev authored
This change disables /dev/binder access to and by mediacodec on full-Treble devices. b/36604251 OMX HAL (aka mediacodec) uses Binder and even exposes a Binder service Test: marlin Change-Id: I1e30a6c56950728f36351c41b2859221753fd91a Signed-off-by:
Iliyan Malchev <malchev@google.com>
-
Andrew Scull authored
am: a95cf663 Change-Id: Ia1273a45798a0ae8a038ad90c8187f81960d6681
-
Alex Klyubin authored
Test: mmm system/sepolicy Bug: 34980020 (cherry picked from commit 3cc6a959) Change-Id: I64c7275551e8e27d68072e8ec38c07b539989da0
-