Skip to content
Snippets Groups Projects
  1. Aug 04, 2017
    • Todd Kennedy's avatar
      Allow PackageManager to create a new service · 8bb80471
      Todd Kennedy authored
      A new API [getNamesForUids] was recently added to the PackageManager
      and this API needs to be accessible to native code. However, there
      were two constraints:
      1) Instead of hand-rolling the binder, we wanted to auto generate
      the bindings directly from the AIDL compiler.
      2) We didn't want to expose/annotate all 180+ PackageManager APIs
      when only a single API is needed.
      So, we chose to create a parallel API that can be used explicitly
      for native bindings without exposing the entirety of the
      PackageManager.
      
      Bug: 62805090
      Test: Manual
      Test: Create a native application that calls into the new service
      Test: See the call works and data and returned
      Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
      8bb80471
  2. May 03, 2017
    • William Roberts's avatar
      storaged: add permissions for dumpstate · fd8f305b
      William Roberts authored
      
      The service "storaged" implememnts a dump() interface for
      dumpsys, and thus it needs to write its state to the fd
      provided by dumpstate.
      
      To correct this, and fix dumpstate, allow the permission.
      
      Fixes:
      avc: denied { use } for pid=3298 comm="dumpsys" path="pipe:[33470]" dev="pipefs" ino=33470 scontext=u:r:storaged:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=0
      
      Test:
      With a device that has storaged, issue the command:
      $ adb shell dumpstate
      
      Change-Id: I515e20f0328b6edc01ea2a7c53b1d3c4ca0e72ac
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      fd8f305b
  3. Apr 13, 2017
  4. Mar 31, 2017
  5. Mar 30, 2017
  6. Mar 24, 2017
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · f5446eb1
      Alex Klyubin authored
      On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
      apps) are not permitted to use Binder. This commit thus:
      * groups non-vendor domains using the new "coredomain" attribute,
      * adds neverallow rules restricting Binder use to coredomain and
        appdomain only, and
      * temporarily exempts the domains which are currently violating this
        rule from this restriction. These domains are grouped using the new
        "binder_in_vendor_violators" attribute. The attribute is needed
        because the types corresponding to violators are not exposed to the
        public policy where the neverallow rules are.
      
      Test: mmm system/sepolicy
      Test: Device boots, no new denials
      Test: In Chrome, navigate to ip6.me, play a YouTube video
      Test: YouTube: play a video
      Test: Netflix: play a movie
      Test: Google Camera: take a photo, take an HDR+ photo, record video with
            sound, record slow motion video with sound. Confirm videos play
            back fine and with sound.
      Bug: 35870313
      Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
      f5446eb1
  7. Feb 27, 2017
  8. Feb 06, 2017
  9. Jan 26, 2017
    • William Roberts's avatar
      te_macros: introduce add_service() macro · 606d2fd6
      William Roberts authored
      
      Introduce the add_service() macro which wraps up add/find
      permissions for the source domain with a neverallow preventing
      others from adding it. Only a particular domain should
      add a particular service.
      
      Use the add_service() macro to automatically add a neverallow
      that prevents other domains from adding the service.
      
      mediadrmserver was adding services labeled mediaserver_service.
      Drop the add permission as it should just need the find
      permission.
      
      Additionally, the macro adds the { add find } permission which
      causes some existing neverallow's to assert. Adjust those
      neverallow's so "self" can always find.
      
      Test: compile and run on hikey and emulator. No new denials were
      found, and all services, where applicable, seem to be running OK.
      
      Change-Id: Ibbd2a5304edd5f8b877bc86852b0694732be993c
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      606d2fd6
  10. Jan 21, 2017
    • Jin Qian's avatar
      storaged: allow reading packages.list · 8ad57ef6
      Jin Qian authored
      Delete rule for permission_service since we use packages.list instead.
      
      Test: adb shell storaged -u
      Bug: 34198239
      Change-Id: Ic69d0fe185e627a932bbf8e85fc13163077bbe6b
      8ad57ef6
  11. Jan 18, 2017
    • Jin Qian's avatar
      Define policy for /proc/uid_io/stats · d345906b
      Jin Qian authored
      New procfs file read by storaged to dump fg/bg IO usage.
      
      Remove kmsg rule since it's no longer used by storaged.
      
      Allow storaged to find permission_service to translate UID
      to package name.
      
      Test: adb shell storaged -u
      Bug: 34198239
      Change-Id: I74654662c75571cbe166cf2b8cbab84828218cbd
      d345906b
  12. Jan 07, 2017
    • Nick Kralevich's avatar
      storaged.te: Remove redundant permission. · 1a022cbb
      Nick Kralevich authored
      All SELinux domains are already granted the ability to read the
      filenames in /proc, so it's unnecessary to add it to storaged.te.
      
        $ grep "proc:dir r_dir_perms" public/domain.te
        allow domain proc:dir r_dir_perms;
      
      Remove redundant rule.
      
      Test: policy compiles.
      Change-Id: I8779cda19176f7eb914778f131bb5b14e5b14448
      1a022cbb
    • ynwang's avatar
      Storaged permissions for task I/O · e68d2d2c
      ynwang authored
      Allow storaged to read /proc/[pid]/io
      Grant binder access to storaged
      Add storaged service
      Grant storaged_exec access to dumpstate
      Grant storaged binder_call to dumpstate
      
      Bug: 32221677
      
      Change-Id: Iecc9dba266c5566817a99ac6251eb943a0bac630
      e68d2d2c
    • ynwang's avatar
      Storaged permission setting · 9fa8823c
      ynwang authored
      Allowing storaged for reading from pseudo filesystems and debugfs.
      
      Bug: 32221677
      
      Change-Id: I837cead9a68f0b399703b64d724cb9c4b205c335
      9fa8823c
Loading