Skip to content
Snippets Groups Projects
Select Git revision
  • d56bcb1c5452c8dcdda7e4ef5d0f44b91b6bb08b
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

service_contexts

Blame
    • Ningyuan Wang's avatar
      d56bcb1c
      sepolicy: add sepolicy binder support for wificond · d56bcb1c
      Ningyuan Wang authored
      This allows wificond to publish binder interface using
      service manager.
      
      Denial warnings:
      
      wificond: type=1400 audit(0.0:8): avc:
      denied { call } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      wificond: type=1400 audit(0.0:9): avc:
      denied { transfer } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      servicemanager: type=1400
      audit(0.0:10): avc: denied { search } for name="6085" dev="proc"
      ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=dir permissive=1
      
      servicemanager: type=1400
      audit(0.0:11): avc: denied { read } for name="current" dev="proc"
      ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current"
      dev="proc" ino=40641 scontext=u:r:servicemanager:s0
      tcontext=u:r:wificond:s0 tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:13): avc: denied { getattr } for
      scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process
      permissive=1
      
      SELinux : avc:  denied  { add } for
      service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0
      tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1
      
      BUG=28867093
      TEST=compile
      TEST=use a client to call wificond service through binder
      
      Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
      d56bcb1c
      History
      sepolicy: add sepolicy binder support for wificond
      Ningyuan Wang authored
      This allows wificond to publish binder interface using
      service manager.
      
      Denial warnings:
      
      wificond: type=1400 audit(0.0:8): avc:
      denied { call } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      wificond: type=1400 audit(0.0:9): avc:
      denied { transfer } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      servicemanager: type=1400
      audit(0.0:10): avc: denied { search } for name="6085" dev="proc"
      ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=dir permissive=1
      
      servicemanager: type=1400
      audit(0.0:11): avc: denied { read } for name="current" dev="proc"
      ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current"
      dev="proc" ino=40641 scontext=u:r:servicemanager:s0
      tcontext=u:r:wificond:s0 tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:13): avc: denied { getattr } for
      scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process
      permissive=1
      
      SELinux : avc:  denied  { add } for
      service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0
      tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1
      
      BUG=28867093
      TEST=compile
      TEST=use a client to call wificond service through binder
      
      Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
    service_contexts 10.77 KiB
    accessibility                             u:object_r:accessibility_service:s0
    account                                   u:object_r:account_service:s0
    activity                                  u:object_r:activity_service:s0
    alarm                                     u:object_r:alarm_service:s0
    android.os.UpdateEngineService            u:object_r:update_engine_service:s0
    android.security.keystore                 u:object_r:keystore_service:s0
    android.service.gatekeeper.IGateKeeperService    u:object_r:gatekeeper_service:s0
    appops                                    u:object_r:appops_service:s0
    appwidget                                 u:object_r:appwidget_service:s0
    assetatlas                                u:object_r:assetatlas_service:s0
    audio                                     u:object_r:audio_service:s0
    backup                                    u:object_r:backup_service:s0
    batteryproperties                         u:object_r:batteryproperties_service:s0
    batterystats                              u:object_r:batterystats_service:s0
    battery                                   u:object_r:battery_service:s0
    bluetooth_manager                         u:object_r:bluetooth_manager_service:s0
    bluetooth                                 u:object_r:bluetooth_service:s0
    carrier_config                            u:object_r:radio_service:s0
    clipboard                                 u:object_r:clipboard_service:s0
    com.android.net.IProxyService             u:object_r:IProxyService_service:s0
    commontime_management                     u:object_r:commontime_management_service:s0
    common_time.clock                        u:object_r:mediaserver_service:s0
    common_time.config                       u:object_r:mediaserver_service:s0
    connectivity                              u:object_r:connectivity_service:s0
    consumer_ir                               u:object_r:consumer_ir_service:s0
    content                                   u:object_r:content_service:s0
    contexthub_service                        u:object_r:contexthub_service:s0
    country_detector                          u:object_r:country_detector_service:s0
    cpuinfo                                   u:object_r:cpuinfo_service:s0
    dbinfo                                    u:object_r:dbinfo_service:s0
    device_policy                             u:object_r:device_policy_service:s0
    deviceidle                                u:object_r:deviceidle_service:s0
    devicestoragemonitor                      u:object_r:devicestoragemonitor_service:s0
    diskstats                                 u:object_r:diskstats_service:s0
    display.qservice                          u:object_r:surfaceflinger_service:s0
    display                                   u:object_r:display_service:s0
    dns_listener                              u:object_r:dns_listener_service:s0
    DockObserver                              u:object_r:DockObserver_service:s0
    dreams                                    u:object_r:dreams_service:s0
    drm.drmManager                            u:object_r:drmserver_service:s0
    dropbox                                   u:object_r:dropbox_service:s0
    ethernet                                  u:object_r:ethernet_service:s0
    fingerprint                               u:object_r:fingerprint_service:s0
    android.hardware.fingerprint.IFingerprintDaemon u:object_r:fingerprintd_service:s0
    gfxinfo                                   u:object_r:gfxinfo_service:s0
    graphicsstats                             u:object_r:graphicsstats_service:s0
    gpu                                       u:object_r:gpu_service:s0
    hardware                                  u:object_r:hardware_service:s0
    hardware_properties                       u:object_r:hardware_properties_service:s0
    hdmi_control                              u:object_r:hdmi_control_service:s0
    inputflinger                              u:object_r:inputflinger_service:s0
    input_method                              u:object_r:input_method_service:s0
    input                                     u:object_r:input_service:s0
    iphonesubinfo_msim                        u:object_r:radio_service:s0
    iphonesubinfo2                            u:object_r:radio_service:s0
    iphonesubinfo                             u:object_r:radio_service:s0
    ims                                       u:object_r:radio_service:s0
    imms                                      u:object_r:imms_service:s0
    isms_msim                                 u:object_r:radio_service:s0
    isms2                                     u:object_r:radio_service:s0
    isms                                      u:object_r:radio_service:s0
    isub                                      u:object_r:radio_service:s0
    jobscheduler                              u:object_r:jobscheduler_service:s0
    launcherapps                              u:object_r:launcherapps_service:s0
    location                                  u:object_r:location_service:s0
    lock_settings                             u:object_r:lock_settings_service:s0
    media.audio_flinger                       u:object_r:audioserver_service:s0
    media.audio_policy                        u:object_r:audioserver_service:s0
    media.camera                              u:object_r:cameraserver_service:s0
    media.camera.proxy                        u:object_r:cameraproxy_service:s0