Skip to content
Snippets Groups Projects
  1. May 02, 2017
    • Michael Wright's avatar
      O is API 26 · 8713882b
      Michael Wright authored
      Bug: 37480230
      Bug: 37896931
      Test: build, boot
      Change-Id: Ib8d4309d37b8818163a17e7d8b25155c4645edcf
      8713882b
  2. May 01, 2017
  3. Apr 29, 2017
  4. Apr 28, 2017
  5. Apr 27, 2017
  6. Apr 26, 2017
  7. Apr 25, 2017
    • TreeHugger Robot's avatar
    • TreeHugger Robot's avatar
    • Alex Klyubin's avatar
      Do not warn about empty typesets in neverallows · c60d3ea1
      Alex Klyubin authored
      Empty typeset is not an issue in neverallow rules. The reason is that
      it's completly normal for scontext or tcontext of neverallow rules to
      evaluate to an empty type set. For example, there are neverallow rules
      whose purpose is to test that all types with particular powers are
      associated with a particular attribute:
        neverallow {
          untrusted_app_all
          -untrusted_app
          -untrusted_app_25
        } domain:process fork;
      
      Test: sepolicy-analyze neverallow -w -n \
                'neverallow {} {}:binder call;'
            produces empty output instead of "Warning!  Empty type set"
      Bug: 37357742
      Change-Id: Id61b4fe22fafaf0522d8769dd4e23dfde6cd9f45
      c60d3ea1
    • Jeff Tinker's avatar
      Allow DRM hal to access fd allocated by mediaserver · 3bc24e68
      Jeff Tinker authored
      Test: gts-tradefed run gts -m GtsMediaTestCases -t com.google.android.media.gts.MediaPlayerTest#testLLAMA_H264_BASELINE_240P_800_DOWNLOADED_V0_SYNC
      
      bug:37548390
      Change-Id: I9c2d446118d3a5f729730b75ec117954e383159b
      3bc24e68
    • Alex Klyubin's avatar
      Assert ban on framework <-> vendor comms over VndBinder · 00657834
      Alex Klyubin authored
      This adds neverallow rules which enforce the prohibition on
      communication between framework and vendor components over VendorBinder.
      This prohibition is similar in spirit to the one for Binder
      communications.
      
      Most changes consist of adding neverallow rules, which do not affect
      runtime behavior. The only change which does affect runtime behavior
      is the change which takes away the right of servicemanager domain to
      transfer Binder tokens to hwservicemanager and vndservicemanager. This
      grant was there by accident (because it was overly broad) and is not
      expected to be needed: servicemanager, hwservicemanager, and
      vndservicemanager are not supposed to be communicating with each
      other.
      
      P. S. The new neverallow rules in app_neverallows.te are covered by
      the new rules in domain.te. The rules were nevertheless added to
      app_neverallows.te for consistency with other *Binder rules there.
      
      Test: mmm system/sepolicy
      Bug: 37663632
      Change-Id: I7c2ae23924bf0f2fed3f1e3a8d4d603129286329
      00657834
    • Alex Klyubin's avatar
      Fix typos in comment · a8a03c84
      Alex Klyubin authored
      This is a follow-up to cbc0d2bb which
      introduced the typos.
      
      Test: mmm system/sepolicy -- comments only change
      Bug: 37640821
      Change-Id: Ibe0eda0b3ee9bbfb1e33ef98f2e81267ec580e59
      a8a03c84
    • TreeHugger Robot's avatar
    • Joel Scherpelz's avatar
Loading