Skip to content
Snippets Groups Projects
  1. Apr 27, 2017
  2. Apr 26, 2017
  3. Apr 25, 2017
    • TreeHugger Robot's avatar
    • Ruchi Kandoi's avatar
      Remove access to sock_file for hal_nfc · ad41fa8d
      Ruchi Kandoi authored
      
      Test: manual
      Bug: 37640900
      Change-Id: I6987d60c1eb1578134b51f4e7417700fd462ba4d
      Signed-off-by: default avatarRuchi Kandoi <kandoiruchi@google.com>
      ad41fa8d
    • Eugene Susla's avatar
      Merge "Remove underscore from Companion service name" into oc-dev · 2cad0f48
      Eugene Susla authored
      am: 364644eb
      
      Change-Id: I83410880ad404a5cabd5d7ec287f5d538110556e
      2cad0f48
    • TreeHugger Robot's avatar
    • Alex Klyubin's avatar
      Do not warn about empty typesets in neverallows · c60d3ea1
      Alex Klyubin authored
      Empty typeset is not an issue in neverallow rules. The reason is that
      it's completly normal for scontext or tcontext of neverallow rules to
      evaluate to an empty type set. For example, there are neverallow rules
      whose purpose is to test that all types with particular powers are
      associated with a particular attribute:
        neverallow {
          untrusted_app_all
          -untrusted_app
          -untrusted_app_25
        } domain:process fork;
      
      Test: sepolicy-analyze neverallow -w -n \
                'neverallow {} {}:binder call;'
            produces empty output instead of "Warning!  Empty type set"
      Bug: 37357742
      Change-Id: Id61b4fe22fafaf0522d8769dd4e23dfde6cd9f45
      c60d3ea1
    • Jeff Tinker's avatar
      Allow DRM hal to access fd allocated by mediaserver · 3bc24e68
      Jeff Tinker authored
      Test: gts-tradefed run gts -m GtsMediaTestCases -t com.google.android.media.gts.MediaPlayerTest#testLLAMA_H264_BASELINE_240P_800_DOWNLOADED_V0_SYNC
      
      bug:37548390
      Change-Id: I9c2d446118d3a5f729730b75ec117954e383159b
      3bc24e68
    • Alex Klyubin's avatar
      Assert ban on framework <-> vendor comms over VndBinder · 00657834
      Alex Klyubin authored
      This adds neverallow rules which enforce the prohibition on
      communication between framework and vendor components over VendorBinder.
      This prohibition is similar in spirit to the one for Binder
      communications.
      
      Most changes consist of adding neverallow rules, which do not affect
      runtime behavior. The only change which does affect runtime behavior
      is the change which takes away the right of servicemanager domain to
      transfer Binder tokens to hwservicemanager and vndservicemanager. This
      grant was there by accident (because it was overly broad) and is not
      expected to be needed: servicemanager, hwservicemanager, and
      vndservicemanager are not supposed to be communicating with each
      other.
      
      P. S. The new neverallow rules in app_neverallows.te are covered by
      the new rules in domain.te. The rules were nevertheless added to
      app_neverallows.te for consistency with other *Binder rules there.
      
      Test: mmm system/sepolicy
      Bug: 37663632
      Change-Id: I7c2ae23924bf0f2fed3f1e3a8d4d603129286329
      00657834
Loading