- Apr 18, 2017
-
-
Dan Cashman authored
am: c787f547 Change-Id: I785929439d8c81ae7d5bf587077708c23fa50170
-
Dan Cashman authored
am: c45e9b9a Change-Id: I6af916d823b983581c5f7b33858364af6b2e4456
-
Dan Cashman authored
am: fdb9c018 Change-Id: I97a63c04df7a70822015d99eb619b4ae0147241f
-
Dan Cashman authored
am: 9d46f9b4 Change-Id: Id3bd7d69bd07fafdf76453e52de01b2b5bb67472
-
Dan Cashman authored
This could be useful in diffs between policy versions. Bug: 37357742 Test: sepolicy-analyze lists all attributes in precompiled_policy. Change-Id: I6532a93d4102cf9cb12b73ee8ed86ece368f9131
-
Alex Klyubin authored
am: fe84716c Change-Id: Id6058cf5c252930b71ca648cdbf7ada0157204ff
-
Alex Klyubin authored
am: 5007c10a Change-Id: I7a35f4749c90e08632bb0013e99624cd34920d9b
-
Jerry Zhang authored
am: 204da471 Change-Id: I266b02ec2b01b3a8717a724b2ca9b6b5dad258d9
-
Jerry Zhang authored
Change-Id: Iafa4abcff36fe75e031fc6b6c2108a7617d34b97
-
Jerry Zhang authored
am: f5defc90 Change-Id: I8a59ecbf59f8e6618bd5a06e61a46594638d6bcd
-
Jerry Zhang authored
am: 9f152d98 Change-Id: I1c319ac3558e5ff96072638dc4be97502da61056
-
TreeHugger Robot authored
-
- Apr 17, 2017
-
-
Jerry Zhang authored
MediaProvider requires permissions that diverge from those of a typical priv_app. This create a new domain and removes Mtp related permissions from priv_app. Bug: 33574909 Test: Connect with MTP, download apps and files, select ringtones Test: DownloadProvider instrument tests, CtsProviderTestCases Change-Id: I950dc11f21048c34af639cb3ab81873d2a6730a9
-
Jerry Zhang authored
MediaProvider requires permissions that diverge from those of a typical priv_app. This create a new domain and removes Mtp related permissions from priv_app. Bug: 33574909 Test: Connect with MTP, download apps and files, select ringtones Test: DownloadProvider instrument tests, CtsProviderTestCases Change-Id: I950dc11f21048c34af639cb3ab81873d2a6730a9
-
Alex Klyubin authored
This commit marks system_server and app domains (except isolated_app) as clients of Graphics Allocator HAL. This makes the policy cleaner and prepares ground for restricting access to HwBinder services. Test: Play video in YouTube app and in Google Chrome YouTube web page Test: Using Google Camera app, take an HDR+ photo, a conventional photo, record a video with sound and a slow motion video with sound, then check that photos look good and videos play back fine, including sound. Bug: 34454312 Change-Id: Iea04d38fa5520432f06af94570fa6ce16ed7979a
-
Martijn Coenen authored
am: 94eaf989 Change-Id: Idb0275994d21bda3b79f83588adf67004486c410
-
Martijn Coenen authored
am: 0d1b2ce1 Change-Id: I2f2bb8fb9974dca42398f7c7cc5e7ace76824d47
-
TreeHugger Robot authored
-
- Apr 16, 2017
-
-
Tianjie Xu authored
am: 2f92a742 Change-Id: I9d1d538260e224c1c159e3f12585397a4bc9833c
-
Tianjie Xu authored
am: 04a9c429 Change-Id: I9c44efe98a994ac302436325809657762ca6d26a
-
Tianjie Xu authored
-
Martijn Coenen authored
Bug: 36604251 Test: Netflix protected content, Play movies Change-Id: I5c2c542007abddbe56b933ff44d65bd376b6691e
-
Martijn Coenen authored
am: b76c352e Change-Id: Ifc70c644ac582f2b3fb65a8f44a893e6626ee01f
-
Sandeep Patil authored
am: 7eac10c7 Change-Id: Idfebcf45797a9feed9fb529a104d0b7e40e5ec28
-
Martijn Coenen authored
am: f69d535c Change-Id: I19a518a9f84d17fdd7d3f7b8613d85785948187f
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 80cab7de Change-Id: Iba1cf44b3e7c965b8ea7033b80a25393730512e9
-
TreeHugger Robot authored
-
Martijn Coenen authored
The new binder_call() lines had to be added because this change removes mediacodec from binderservicedomain (on full-treble), hence domains that could previously reach mediacodec with binder_call(domain, binderservicedomain) now need explicit calls instead. Test: Youtube, Netflix, Maps, Chrome, Music Change-Id: I3325ce20d9304bc07659fd435554cbcbacbc9829
-
Sandeep Patil authored
Bug: 36463595 Test: make -j48 sepolicy Change-Id: Id8e66e3e08ceb1301c36824af93410aa84def8d3 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Martijn Coenen authored
am: 6cc5334a Change-Id: Ic465169a0ac0c04a2114a4268caae3b82a7b6706
-
Martijn Coenen authored
am: e506cda3 Change-Id: I9df35ecb00db0ed5d3a1430e64056e09579ab0a5
-
Martijn Coenen authored
-
- Apr 15, 2017
-
-
Sandeep Patil authored
am: 6a4b6c68 Change-Id: Ie9c93a313215652d22fa2bc93aeb2a468916e008
-
Sandeep Patil authored
am: acb66317 Change-Id: Ib10b8c031066507b72361e302204646d3c9f9814
-
TreeHugger Robot authored
-
Martijn Coenen authored
Test: WIP Change-Id: I678b0d0e9750b25628b86060574fd516d3749cdf
-
Jeff Vander Stoep authored
am: 405e7283 Change-Id: I6045f5edf0ef32d3001eb76a8437a2b92790cca3
-
Jeff Vander Stoep authored
am: 748cae86 Change-Id: Ia9c8f25a66ba8cf8528e80b3ce4c151f10574a6d
-
Sandeep Patil authored
Temporary attribute (checked against in CTS) to point out vendor processes that run /system executables. These are currently only down to 2-3 of them that are related to telephony on sailfish Bug: 36463595 Test: Build succeeds for sailfish Test: ./cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.security.cts.SELinuxHostTest#testNoExemptionsForVendorExecutingCore \ --skip-device-info --skip-preconditions --skip-connectivity-check \ --abi arm64-v8a Change-Id: I9eb40ad259aefba73869d6a1b40186d33fa475dd Signed-off-by:
Sandeep Patil <sspatil@google.com>
-