Skip to content
Snippets Groups Projects
  1. Mar 24, 2017
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" am: 73a6f38b · f91f369d
      Alex Klyubin authored
      am: 5d8fcf3b
      
      Change-Id: I5f88b48df906acb9381dc853d61dcd5ef8d5e4e4
      f91f369d
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 5d8fcf3b
      Alex Klyubin authored
      am: 73a6f38b
      
      Change-Id: I24d9be712209ee22a33ae858001c4e38e0eb763a
      5d8fcf3b
    • Alex Klyubin's avatar
      Merge "Mark all clients of Allocator HAL" · 73a6f38b
      Alex Klyubin authored
      73a6f38b
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too am: 6b558dcb · f535a40d
      Alex Klyubin authored
      am: e1742ef0
      
      Change-Id: I007ae4064a8daf690b15bc5196131169727cbec9
      f535a40d
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · e1742ef0
      Alex Klyubin authored
      am: 6b558dcb
      
      Change-Id: I82c412038e43bb343dc355c9d1e56a11f6da6542
      e1742ef0
    • Alex Klyubin's avatar
      Mark all clients of Allocator HAL · 7cda44f4
      Alex Klyubin authored
      This change associates all domains which are clients of Allocator HAL
      with hal_allocator_client and the, required for all HAL client
      domains, halclientdomain.
      
      This enables this commit to remove the now unnecessary hwallocator_use
      macro because its binder_call(..., hal_allocator_server) is covered by
      binder_call(hal_allocator_client, hal_allocator_server) added in this
      commit.
      
      Unfortunately apps, except isolated app, are clients of Allocator HAL
      as well. This makes it hard to use the hal_client_domain(...,
      hal_allocator) macro because it translates into "typeattribute" which
      currently does not support being provided with a set of types, such as
      { appdomain -isolated_app }. As a workaround, hopefully until
      typeattribute is improved, this commit expresses the necessary
      association operation in CIL. private/technical_debt.cil introduced by
      this commit is appended into the platform policy CIL file, thus
      ensuring that the hack has effect on the final monolithic policy.
      
      P. S. This change also removes Allocator HAL access from isolated_app.
      Isolated app shouldn't have access to this HAL anyway.
      
      Test: Google Play Music plays back radios
      Test: Google Camera records video with sound and that video is then
            successfully played back with sound
      Test: YouTube app plays back clips with sound
      Test: YouTube in Chrome plays back clips with sound
      Bug: 34170079
      Change-Id: Id00bba6fde83e7cf04fb58bc1c353c2f66333f92
      7cda44f4
    • Alex Klyubin's avatar
      su and perfprofd are coredomain too · 6b558dcb
      Alex Klyubin authored
      This is a follow-up to f5446eb1 where
      I forgot to associate su and perfprofd domains with coredomain.
      
      Test: mmm system/sepolicy
            sepolicy-analyze $OUT/root/sepolicy attribute coredomain
      Bug: 35870313
      Change-Id: I13f90693843f7c6fe9fea8e5332aa6dd9558478a
      6b558dcb
    • Alex Klyubin's avatar
      Vendor domains must not use Binder am: f5446eb1 · 49ce4394
      Alex Klyubin authored
      am: 2fe065d7
      
      Change-Id: Ieefcec5619fc2b941a675b473661dc561864ffc9
      49ce4394
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · 2fe065d7
      Alex Klyubin authored
      am: f5446eb1
      
      Change-Id: I23d5d274ae05a9b0bdac6872be86c3f56aec734e
      2fe065d7
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · f5446eb1
      Alex Klyubin authored
      On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
      apps) are not permitted to use Binder. This commit thus:
      * groups non-vendor domains using the new "coredomain" attribute,
      * adds neverallow rules restricting Binder use to coredomain and
        appdomain only, and
      * temporarily exempts the domains which are currently violating this
        rule from this restriction. These domains are grouped using the new
        "binder_in_vendor_violators" attribute. The attribute is needed
        because the types corresponding to violators are not exposed to the
        public policy where the neverallow rules are.
      
      Test: mmm system/sepolicy
      Test: Device boots, no new denials
      Test: In Chrome, navigate to ip6.me, play a YouTube video
      Test: YouTube: play a video
      Test: Netflix: play a movie
      Test: Google Camera: take a photo, take an HDR+ photo, record video with
            sound, record slow motion video with sound. Confirm videos play
            back fine and with sound.
      Bug: 35870313
      Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
      f5446eb1
    • Alex Klyubin's avatar
      Merge "Remove unnecessary rules from NFC HAL clients" am: 93f99cb1 · da6c88c9
      Alex Klyubin authored
      am: 3d12305d
      
      Change-Id: Id45b1a26067b7525feabb029d5c98270d0c5994b
      da6c88c9
    • Alex Klyubin's avatar
      Merge "Remove unnecessary rules from NFC HAL clients" · 3d12305d
      Alex Klyubin authored
      am: 93f99cb1
      
      Change-Id: I877e23910bc424a2026bab1d9669bc6537ea5c31
      3d12305d
    • Treehugger Robot's avatar
  2. Mar 23, 2017
  3. Mar 22, 2017
Loading