Skip to content
Snippets Groups Projects
  1. Mar 31, 2017
  2. Mar 30, 2017
  3. Mar 29, 2017
  4. Mar 28, 2017
  5. Mar 27, 2017
  6. Mar 26, 2017
  7. Mar 25, 2017
  8. Mar 24, 2017
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 5d8fcf3b
      Alex Klyubin authored
      am: 73a6f38b
      
      Change-Id: I24d9be712209ee22a33ae858001c4e38e0eb763a
      5d8fcf3b
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 73a6f38b
      Alex Klyubin authored
      73a6f38b
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · e1742ef0
      Alex Klyubin authored
      am: 6b558dcb
      
      Change-Id: I82c412038e43bb343dc355c9d1e56a11f6da6542
      e1742ef0
    • Alex Klyubin's avatar
      Mark all clients of Allocator HAL · 7cda44f4
      Alex Klyubin authored
      This change associates all domains which are clients of Allocator HAL
      with hal_allocator_client and the, required for all HAL client
      domains, halclientdomain.
      
      This enables this commit to remove the now unnecessary hwallocator_use
      macro because its binder_call(..., hal_allocator_server) is covered by
      binder_call(hal_allocator_client, hal_allocator_server) added in this
      commit.
      
      Unfortunately apps, except isolated app, are clients of Allocator HAL
      as well. This makes it hard to use the hal_client_domain(...,
      hal_allocator) macro because it translates into "typeattribute" which
      currently does not support being provided with a set of types, such as
      { appdomain -isolated_app }. As a workaround, hopefully until
      typeattribute is improved, this commit expresses the necessary
      association operation in CIL. private/technical_debt.cil introduced by
      this commit is appended into the platform policy CIL file, thus
      ensuring that the hack has effect on the final monolithic policy.
      
      P. S. This change also removes Allocator HAL access from isolated_app.
      Isolated app shouldn't have access to this HAL anyway.
      
      Test: Google Play Music plays back radios
      Test: Google Camera records video with sound and that video is then
            successfully played back with sound
      Test: YouTube app plays back clips with sound
      Test: YouTube in Chrome plays back clips with sound
      Bug: 34170079
      Change-Id: Id00bba6fde83e7cf04fb58bc1c353c2f66333f92
      7cda44f4
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · 6b558dcb
      Alex Klyubin authored
      This is a follow-up to f5446eb1 where
      I forgot to associate su and perfprofd domains with coredomain.
      
      Test: mmm system/sepolicy
            sepolicy-analyze $OUT/root/sepolicy attribute coredomain
      Bug: 35870313
      Change-Id: I13f90693843f7c6fe9fea8e5332aa6dd9558478a
      6b558dcb
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · 2fe065d7
      Alex Klyubin authored
      am: f5446eb1
      
      Change-Id: I23d5d274ae05a9b0bdac6872be86c3f56aec734e
      2fe065d7
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · f5446eb1
      Alex Klyubin authored
      On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
      apps) are not permitted to use Binder. This commit thus:
      * groups non-vendor domains using the new "coredomain" attribute,
      * adds neverallow rules restricting Binder use to coredomain and
        appdomain only, and
      * temporarily exempts the domains which are currently violating this
        rule from this restriction. These domains are grouped using the new
        "binder_in_vendor_violators" attribute. The attribute is needed
        because the types corresponding to violators are not exposed to the
        public policy where the neverallow rules are.
      
      Test: mmm system/sepolicy
      Test: Device boots, no new denials
      Test: In Chrome, navigate to ip6.me, play a YouTube video
      Test: YouTube: play a video
      Test: Netflix: play a movie
      Test: Google Camera: take a photo, take an HDR+ photo, record video with
            sound, record slow motion video with sound. Confirm videos play
            back fine and with sound.
      Bug: 35870313
      Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
      f5446eb1
    • Alex Klyubin's avatar
      Merge "Remove unnecessary rules from NFC HAL clients" · 3d12305d
      Alex Klyubin authored
      am: 93f99cb1
      
      Change-Id: I877e23910bc424a2026bab1d9669bc6537ea5c31
      3d12305d
    • Treehugger Robot's avatar
Loading