- Feb 23, 2017
-
-
Alex Klyubin authored
am: 9ec226df Change-Id: I8c966360f4d7b28e5b4fe60739bd36737a601db8
-
Alex Klyubin authored
am: 0aca0241 Change-Id: Ieceee81236f8fa5d7d2bb328274b7e91c11fbae1
-
Alex Klyubin authored
-
- Feb 22, 2017
-
-
Mårten Kongstad authored
am: 9fa01919 Change-Id: I8625aca8f8c8e925585afd84822680e9e0d812ec
-
Mårten Kongstad authored
am: 5a2de627 Change-Id: I960ee43281da8c8c6b0ec68bbea2ac53f43ab457
-
Alex Klyubin authored
This switches Wi-Fi HAL policy to the design which enables us to conditionally remove unnecessary rules from domains which are clients of Wi-Fi HAL. Domains which are clients of Wi-Fi HAL, such as system_server domain, are granted rules targeting hal_wifi only when the Wi-Fi HAL runs in passthrough mode (i.e., inside the client's process). When the HAL runs in binderized mode (i.e., in another process/domain, with clients talking to the HAL over HwBinder IPC), rules targeting hal_wifi are not granted to client domains. Domains which offer a binderized implementation of Wi-Fi HAL, such as hal_wifi_default domain, are always granted rules targeting hal_wifi. Test: Setup Wizard (incl. adding a Google Account) completes fine with Wi-Fi connectivity only Test: Toggle Wi-Fi off, on, off, on Test: Use System UI to see list of WLANs and connect to one which does not require a password, and to one which requries a PSK Test: ip6.me loads fine in Chrome over Wi-Fi Bug: 34170079 Change-Id: I7a216a06727c88b7f2c23d529f67307e83bed17f
-
Treehugger Robot authored
-
Myles Watson authored
am: ade5c284 Change-Id: Ic0b15caac14587bb6a6326ca53f956c78188b42a
-
Myles Watson authored
am: 20b8d6b9 Change-Id: I8d3fe3a79791560669be031c790cd3862fb8782b
-
Myles Watson authored
Bug: 35657600 Test: user build of Marlin starts with BT Change-Id: Ic2380da66467b9b1c385da7d7fa10fddf4c7fae1
-
Alex Klyubin authored
am: 872ff684 Change-Id: Ic4e4cd105af65b5ee7c0adfb62f851bff55fed70
-
Alex Klyubin authored
am: 706bb202 Change-Id: I0f2169981c80769e85c686f637135097e2d74f56
-
Treehugger Robot authored
-
Mårten Kongstad authored
The 'overlay' service is the Overlay Manager Service, which tracks packages and their Runtime Resource Overlay overlay packages. Change-Id: I897dea6a32c653d31be88a7b3fc56ee4538cf178 Co-authored-by:
Martin Wallgren <martin.wallgren@sonymobile.com> Signed-off-by:
Zoran Jovanovic <zoran.jovanovic@sonymobile.com> Bug: 31052947 Test: boot the Android framework
-
Jeff Vander Stoep authored
am: 2c99c9ff Change-Id: Ic11f3abd6b27769ac1c77af0530cec6b4702d911
-
Jeff Vander Stoep authored
am: 2f348392 Change-Id: Ia375e92fac568547c44adc42090843ad9ba7eb9f
-
Treehugger Robot authored
-
Alex Klyubin authored
This switches Dumpstate HAL policy to the design which enables us to conditionally remove unnecessary rules from domains which are clients of Dumpstate HAL. Domains which are clients of Dumpstate HAL, such as dumpstate domain, are granted rules targeting hal_dumpstate only when the Dumpstate HAL runs in passthrough mode (i.e., inside the client's process). When the HAL runs in binderized mode (i.e., in another process/domain, with clients talking to the HAL over HwBinder IPC), rules targeting hal_dumpstate are not granted to client domains. Domains which offer a binderized implementation of Dumpstate HAL, such as hal_dumpstate_default domain, are always granted rules targeting hal_dumpstate. Test: adb bugreport Test: Take bugreport through system UI Bug: 34170079 Change-Id: I3e827534af03cdfa876921c5fa4af3a53025ba27
-
Jeff Vander Stoep authored
Bug: 35632346 Test: build and boot aosp_marlin Change-Id: Ia2d019b0160e9b512f3e3a70ded70504fe4fea0c
-
Lucas Duffey authored
am: 351ba2c8 Change-Id: I961d7edd3d14c0f87f54ecfe6b0947ed454d1f66
-
Lucas Duffey authored
am: d68aae65 Change-Id: Ib57282ba98e07b330df27ae203f51ce17568088b
-
Treehugger Robot authored
-
Alex Klyubin authored
am: bb252e98 Change-Id: Ic428c4301b2b6f8de5ba24b152e10d900c0f5aac
-
Alex Klyubin authored
am: 313dfe7d Change-Id: Id3134f3157f29b3e878cde82ed33cac35f162c87
-
Treehugger Robot authored
-
Lucas Duffey authored
In the master external/ipsec-tools/{main.c, racoon.rc}, racoon doesn't call setuid, and doesn't have the setuid capability. Bug: 35642293 Signed-off-by:
Lucas Duffey <lucas.duffey@invapid.org>
-
Yin-Chia Yeh authored
am: a5c6cd06 Change-Id: I0100cedf44cf395891271228aa4ce0ef4bda86a0
-
Yin-Chia Yeh authored
am: 1c4014ab Change-Id: I2a36fd9265032e343e92adf022705121bba287f4
-
Yin-Chia Yeh authored
-
Dimitry Ivanov authored
am: ef27bb8a Change-Id: I3b65acb16cb57db7964967529c01acef838f757e
-
Dimitry Ivanov authored
am: 429e71a6 Change-Id: Id9a9c60ac55405ab02cede5690431c3ceacd1dba
-
Dimitry Ivanov authored
Bug: http://b/32123312 Test: mm && boot Change-Id: I6550fbe2bd5f9f5a474419b483b0f786d4025e88
-
Chad Brubaker authored
am: eaf5525c Change-Id: I7e58af319179acde4306c639e0408d5c364c277a
-
Chad Brubaker authored
am: 0b1e965f Change-Id: I666c3e5d216d9b3b1110d72467ed855fd78b2afb
-
Chad Brubaker authored
-
Alex Klyubin authored
This switches Fingerprint HAL policy to the design which enables us to conditionally remove unnecessary rules from domains which are clients of Bluetooth HAL. Domains which are clients of Fingerprint HAL, such as system_server domain, are granted rules targeting hal_fingerprint only when the Fingerprint HAL runs in passthrough mode (i.e., inside the client's process). When the HAL runs in binderized mode (i.e., in another process/domain, with clients talking to the HAL over HwBinder IPC), rules targeting hal_fingerprint are not granted to client domains. Domains which offer a binderized implementation of Fingerprint HAL, such as hal_fingerprint_default domain, are always granted rules targeting hal_fingerprint. NOTE: This commit also removes unnecessary allow rules from Fingerprint HAL, such access to servicemanager (not hwservicemanager) and access to keystore daemon over Binder IPC. Fingerprint HAL does not use this functionality anyway and shouldn't use it either. Test: Enable fingerprint + PIN secure lock screen, confirm it unlocks with fingerprint or PIN Test: Disable PIN (and thus fingerprint) secure lock screen Test: make FingerprintDialog, install, make a fake purchase Test: Add fingerprint_hidl_hal_test to device.mk, build & add to device, adb shell stop, adb shell /data/nativetest64/fingerprint_hidl_hal_test/fingerprint_hidl_hal_test -- all tests pass Bug: 34170079 Change-Id: I6951c0f0640194c743ff7049357c77f5f21b71a1
-
- Feb 21, 2017
-
-
Yin-Chia Yeh authored
The preview surface will run in app process and hal_camera will need to wait on FD generated by preview surface. Test: the denial is gone, able to take photo in messenger/hangout/drive application. Bug: 35589980 Bug: 35485227 Change-Id: I1977174369b104617156065ff25203a17265b707
-
Alex Klyubin authored
am: 0ccb8836 Change-Id: I416995e57663912c8383206416184bccdd0f8a20
-
Alex Klyubin authored
am: 205ec044 Change-Id: Ia8ffaa7a7d2f92cdd9d298de92154660462e5dcf
-
Chad Brubaker authored
untrusted_v2_app is basically a refinement of untrusted_app with legacy capabilities removed and potentially backwards incompatible changes. This is not currently hooked up to anything. Bug: 33350220 Test: builds Change-Id: Ic9fad57476bc2b6022b1eaca8667bf6d844753c2
-