- Jun 22, 2017
-
-
Tomasz Wasilczyk authored
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
am: 3f7f66b0 Change-Id: I3fc0cac7fdeab40bfa61f465a6d01d1d8c0c8d01
-
Daniel Rosenberg authored
am: 4e65fed1 Change-Id: I9fd1ef32fde011d00e96555501f7665baf99fc26
-
Daniel Rosenberg authored
am: f26d79c5 Change-Id: I0c1a79082955faeebe8cf70bb408928479117aad
-
Daniel Rosenberg authored
am: b9bba83a Change-Id: I2fb029b770d53bacbe8dd11a69cee5e70b6ef2e9
-
Treehugger Robot authored
-
Joel Galenson authored
A previous commit reverted us back to using file_contexts instead of genfs_contexts but did not remove the new genfs_contexts rules, which caused this problem. Bug: 62901680 Test: Verified that the errors do not apepar and that wifi and traceur work. Change-Id: Ic0078dc3a2a9d3d35a10599239fdf9fa478f1e2b
-
TreeHugger Robot authored
-
Tomonori Nanbu authored
Merge "Add sepolicy for hal_wifi to access /proc/modules" am: 6acd70b9 am: ded0b58d am: 9d86e622 am: b9621bba Change-Id: I001be0f05e59e55dcedb159ec86a5bf386fa89c7
-
Tomonori Nanbu authored
am: 9d86e622 Change-Id: Ib83f52f4dae096d42dedf17898cf20d8c3923f2e
-
Tomonori Nanbu authored
am: ded0b58d Change-Id: I574e60486bb12214e33a8e9aabf7794d4ebc0b1a
-
Tomonori Nanbu authored
am: 6acd70b9 Change-Id: Ia4a4ffdf43cb1641785e18f9aad7ca96b5d45ab9
-
Treehugger Robot authored
-
Tomasz Wasilczyk authored
Bug: b/36863239 Test: manual Change-Id: I7e929926efbb1570ea9723ef3810a511c71dc11a
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: 65ffb065 am: bc6271bc Change-Id: I2915ce7ffa3f11d07c26a32b2d9b2d463a3c21f4
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: ed27bec5 am: 9f5801de Change-Id: I5861f5464762ddea8c6a39cb3968d73017d9767d
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: 65ffb065 Change-Id: I4b3f0207400200d19f8e055ec35d518f0951d235
-
Sandeep Patil authored
Merge "Revert "Annotate rild with socket_between_core_and_vendor_violators"" into oc-dev am: 0e0ed156 am: ed27bec5 Change-Id: Idac884677a3304144801a4929651c1ba1199a8b8
-
Sandeep Patil authored
am: 0e0ed156 Change-Id: I8ec0c46355507e8c1a7d10c53805eb350ebbe6a5
-
Sandeep Patil authored
am: 0e0ed156 Change-Id: Ic73d84dacc95d5b902dc6c9530b98e53d71574f1
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
This adds parellel rules to the ones added for media_rw_data_file to allow apps to access vfat under sdcardfs. This should be reverted if sdcardfs is modified to alter the secontext it used for access to the lower filesystem Change-Id: Idb123206ed2fac3ead88b0c1ed0b66952597ac65 Bug: 62584229 Test: Run android.appsecurity.cts.ExternalStorageHostTest with an external card formated as vfat Signed-off-by:
Daniel Rosenberg <drosen@google.com>
-
- Jun 21, 2017
-
-
Dan Cashman authored
This reverts commit 3e307a4d. Test: Builds - neverallow change only. Bug: 62806062 Change-Id: Id3aa1b425cf48fc8586890c9850a74594584922d
-
Jeff Vander Stoep authored
Merge "Exempt tetheroffload hal from network socket restrictions" into oc-dev am: 6351c374 am: 319d7099 am: b24567f4 Change-Id: Ib51077433505dfb09c9a4519235ab3b51f22d149
-
Jeff Vander Stoep authored
Merge "Exempt tetheroffload hal from network socket restrictions" into oc-dev am: 6351c374 am: d9301ac6 am: aae5c4c8 Change-Id: Id94e113b5a5621b39420294eec1e7fd9e1bc1c42
-
Jeff Vander Stoep authored
am: 319d7099 Change-Id: Ifcb3c7111dbb840041d1244caa6afebfbeb1cde7
-
Jeff Vander Stoep authored
am: d9301ac6 Change-Id: I4b272a59a7e48e1f0f15ddd1acb7e8f6b836ca40
-
Jeff Vander Stoep authored
am: 6351c374 Change-Id: I6e661aa37702c36e9003dcf41dbed4b754122c87
-
Jeff Vander Stoep authored
am: 6351c374 Change-Id: I16cbe7b654532367829a0df2dcfa929c38e547fd
-
TreeHugger Robot authored
-
Sandeep Patil authored
This reverts commit 57e9946f. Bug: 62616897 Test: choosecombo 1 aosp_arm64_ab userdebug; m -j 80 The build should not break. Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Dan Cashman authored
am: e51e6131 Change-Id: I153a14af008e52fbe6677007e0e1ad4e472be3da
-
Dan Cashman authored
am: 11dcf197 Change-Id: I96b2af315b4c35ddd47315f3ca4a9b098eab1d59
-
Dan Cashman authored
am: 317c4171 Change-Id: I418cc929f8e0a698220e0b8b1c51314ef9ea52a8
-
Dan Cashman authored
am: 044d2072 Change-Id: Ia6f8a806adae230df50f8d06edcf4ba9d2ae4352
-
Dan Cashman authored
am: 3e307a4d Change-Id: Ic144d924948d7b8e73939806d761d27337dbebef
-
Dan Cashman authored
am: 3e307a4d Change-Id: I90e567c8138fa75bf792af181890d0af627b6f48
-
Jeff Vander Stoep authored
The tetheroffload hal must be able to use network sockets as part of its job. Bug: 62870833 Test: neverallow-only change builds. Change-Id: I630b36340796a5ecb5db08e732b0978dd82835c7
-
Dan Cashman authored
Same-process HALs are forbidden except for very specific HALs that have been provided and whitelisted by AOSP. As a result, a vendor extension HAL may have a need to be accessed by untrusted_app. This is still discouraged, and the existing AOSP hwservices are still forbidden, but remove the blanket prohibition. Also indicate that this is temporary, and that partners should expect to get exceptions to the rule into AOSP in the future. Bug: 62806062 Test: neverallow-only change builds. Verify new attribute is in policy. Change-Id: I6d3e659147d509a3503c2c9e0b6bb9016cc75832
-