- May 05, 2017
-
-
Daniel Nicoara authored
-
- May 04, 2017
-
-
Dimitry Ivanov authored
This is needed by linker to be able to load libraries from memfd which currently generated following denial: avc: denied { getattr } for path=2F6D656D66643A666F6F626172202864656C6574656429 dev="tmpfs" ino=902079 scontext=u:r:shell:s0 tcontext=u:object_r:shell_tmpfs:s0 tclass=file permissive=0 Bug: http://b/37245203 Bug: http://b/37916741 Test: builds Change-Id: I5b57b6cada50a62657c8daaaaaa56f1ee9cdb376
-
Ian Pedowitz authored
-
- May 03, 2017
-
-
Ian Pedowitz authored
This reverts commit 8713882b. Reason for revert: b/37355569 Bug: 37480230 Bug: 37896931 Bug: 37355569 Change-Id: Ic07d948fd0b4a0a8434e1f4f0c8e559c4258cf5e
-
- May 02, 2017
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Michael Wright authored
Bug: 37480230 Bug: 37896931 Test: build, boot Change-Id: Ib8d4309d37b8818163a17e7d8b25155c4645edcf
-
Steven Moreland authored
Whether a device is full Treble or not, omx should be able to access vndbinder Test: (sanity) oc-dev marlin boots + YouTube + lshal Fixes: 37528973 Change-Id: Idd734b42c7dfe3e09e544680a6893b03910ecd3e
-
- May 01, 2017
-
-
Salvador Martinez authored
-
- Apr 29, 2017
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Hassan Shojania authored
-
Chris Forbes authored
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Hassan Shojania authored
Bug: 37713584 Test: With GtsMediaTestCases.apk installed, try: adb shell am instrument -w -e class 'com.google.android.media.gts.MediaPlayerTest#testLLAMA_H264_BASELINE_240P_800_DOWNLOADED_V0_SYNC' 'com.google.android.media.gts/android.support.test.runner.AndroidJUnitRunner' Change-Id: Icc2066e9d9bbc5c020b6d694e9627487771ef35e
-
Andreas Gampe authored
The linker now requires getattr rights for the filesystem. Otherwise linking otapreopt and patchoat/dex2oat will fail. Bug: 37776530 Test: m Test: manual OTA Change-Id: I1351fbfa101beca4ba80f84b0dd9dbcabe2c9d39
-
- Apr 28, 2017
-
-
Pawin Vongmasa authored
Test: Manual use of Camera app Test: lshal shows IOmxStore Bug: 37657124 Bug: 37726880 Change-Id: I5459d992c2feb14bd26765673864e583d48e3ba4
-
Chris Forbes authored
Fixes `adb shell cmd gpu vkjson`, which was previously failing due to surfaceflinger not being able to use the socket passed to it by adbd. Bug: b/37157136 Test: run above command, verified on marlin + bullhead Change-Id: I57fa7e99d5c3dc7bc7d033b83f8ce6032162d7d3
-
Sandeep Patil authored
The typical use case is where vendor apps which run as untrusted apps use libraries that are packaged withing the apk Bug: 37753883 Test: Tested by runnig pre-installed app that packages a library from /vendor/app Change-Id: I445144e37e49e531f4f43b13f34d6f2e78d7a3cf Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Phil Burk authored
The API does not expose the FD directly. But they are used by libaaudio.so linked with the app. Needed for low latency audio. Bug: 37167970 Test: NativeOboe touch to tone latency app Change-Id: I92372eff44d856e9aff399dc9c64fd18524fdc44 Signed-off-by:
Phil Burk <philburk@google.com>
-
Jeff Vander Stoep authored
Adding the default label/mapping is important because: 1. Lookups of services without an selinux label should generate a denial. 2. In permissive mode, lookups of a service without a label should be be allowed, without the default label service manager disallows access. 3. We can neverallow use of the default label. Bug: 37762790 Test: Build and flash policy onto Marlin with unlabeled vendor services. Add/find of unlabeled vendor services generate a denial. Change-Id: I66531deedc3f9b79616f5d0681c87ed66aca5b80 (cherry picked from commit 639a2b84)
-
Steven Moreland authored
Test: Play Music over BT headset Bug: 37640821 Change-Id: I1fe6c9a289315dc0118888e19250cd64aee9a0d5
-
Mikhail Naganov authored
Audioserver loads A2DP module directly. The A2DP module talks to the bluetooth server. Bug: 37640821 Test: Play Music over BT headset Change-Id: Ie6233e52a3773b636a81234b73e5e64cfbff458e
-
Nick Kralevich authored
-
Daniel Nicoara authored
-
- Apr 27, 2017
-
-
TreeHugger Robot authored
* changes: NFC HAL no longer violates socket access restrictions Remove access to sock_file for hal_nfc
-
Abodunrinwa Toki authored
Test: bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest Bug: 34780396 Change-Id: I8b98fef913df571e55474ea2529f71750874941c
-
Ruchi Kandoi authored
Test: compiles Bug: 37640900 Change-Id: Ia9960af9da880fd130b5fb211a054689e2353f1d Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
Ruchi Kandoi authored
Test: manual Bug: 37640900 Change-Id: I6987d60c1eb1578134b51f4e7417700fd462ba4d Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com> (cherry picked from commit ad41fa8d)
-
- Apr 26, 2017
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Chad Brubaker authored
Rules defined in utrusted_app_all do not apply to all untrusted apps, update the comments to reflect that. Test: builds Change-Id: I6f064bd93c13d8341128d941be34fdfaa0bec5da
-
Philip Cuadra authored
Bluetooth needs the capability to set audio-related threads to be RT scheduled. Grant it sys_nice. system_server needs to set priority for the Bluetooth HAL. Allow it. Bug 37518404 Test: Play Bluetooth audio, confirm RT scheduling with systrace Merged-In: Iaf7b85a11a51883744d72a50addfd320b6fbbc2f Change-Id: Iaf7b85a11a51883744d72a50addfd320b6fbbc2f (cherry picked from commit 6eee6eb2)
-
Nick Kralevich authored
The fuse_device neverallow rules are too aggressive and are inhibiting certain vendor customizations. Relax the /dev/fuse neverallow rules so that they better reflect the security invariants we want to uphold. Bug: 37496487 Test: policy compiles. Change-Id: Ie73b0ba7c76446afc2a7a23ebed1275c977d932d
-
TreeHugger Robot authored
-
Alex Klyubin authored
-
Alex Klyubin authored
-