Skip to content
Snippets Groups Projects
  1. Aug 14, 2017
  2. Aug 12, 2017
  3. Aug 11, 2017
    • TreeHugger Robot's avatar
    • Dan Cashman's avatar
      Add missing attribute to compatibility file. · 758d2561
      Dan Cashman authored
      untrusted_app_visible_hwservice was an attribute that was meant to
      give partners time to add their HALs to AOSP.  It was removed from mr1
      and so needs to be accounted for in the compatibility mapping.
      
      Bug: 64321916
      Test: Builds with treble policy tests.
      Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
      758d2561
    • Steven Moreland's avatar
      Add screencap domain. · f27bba93
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      f27bba93
    • Martijn Coenen's avatar
      Prevent access to nonplat_service_contexts on full_treble. · 431a03bb
      Martijn Coenen authored
      On Full Treble devices, servicemanager should only service
      services from the platform service_contexts file.
      
      Created new type to separate plat_ and nonplat_service_contexts,
      and added new type to mapping (although I don't think this type
      should have been used by vendors).
      
      Bug: 36866029
      Test: Marlin/Taimen boot
      Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
      431a03bb
  4. Aug 09, 2017
  5. Aug 08, 2017
  6. Aug 04, 2017
    • Todd Kennedy's avatar
      Allow PackageManager to create a new service · 8bb80471
      Todd Kennedy authored
      A new API [getNamesForUids] was recently added to the PackageManager
      and this API needs to be accessible to native code. However, there
      were two constraints:
      1) Instead of hand-rolling the binder, we wanted to auto generate
      the bindings directly from the AIDL compiler.
      2) We didn't want to expose/annotate all 180+ PackageManager APIs
      when only a single API is needed.
      So, we chose to create a parallel API that can be used explicitly
      for native bindings without exposing the entirety of the
      PackageManager.
      
      Bug: 62805090
      Test: Manual
      Test: Create a native application that calls into the new service
      Test: See the call works and data and returned
      Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
      8bb80471
    • Dan Cashman's avatar
      Record thermalserviced_tmpfs for compat infrastructure. · e772a5cf
      Dan Cashman authored
      Commit: ec3b6b7e added a new daemon
      and corresponding types to sepolicy.  The explicitly declared types
      were added to 26.0.ignore.cil to reflect the labeling of new objects,
      but another type, thermalserviced_tmpfs was created by macro and was
      missed in code review.  Add it as well.
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Ia8968448eea0be889911f46fe255f581659eb548
      (cherry picked from commit 2490f1ad)
      e772a5cf
    • Todd Poynor's avatar
      thermal: sepolicy for thermalservice and Thermal HAL revision 1.1 · e9b2def7
      Todd Poynor authored
      Add sepolicy for thermalserviced daemon, IThermalService binder
      service, IThermalCallback hwservice, and Thermal HAL revision 1.1.
      
      Test: manual: marlin with modified thermal-engine.conf
      Bug: 30982366
      Change-Id: I207fa0f922a4e658338af91dea28c497781e8fe9
      (cherry picked from commit ec3b6b7e)
      e9b2def7
  7. Aug 02, 2017
  8. Aug 01, 2017
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · 61d9aaf9
      Ruchi Kandoi authored
      am: 0393dafd
      
      Change-Id: Ida00cdf24a809888233ede97a83d42ed5c1a8574
      61d9aaf9
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · 0393dafd
      Ruchi Kandoi authored
      type=1400 audit(1501520483.066:14): avc: denied { write } for pid=3330
      comm=4173796E635461736B202331 name="property_service" dev="tmpfs"
      ino=10749 scontext=u:r:nfc:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Test: No sepolicy denials
      Bug: 64010793
      Change-Id: I8d73e8e19cd4d0a8c61f1f184820c53e5cc2b6d6
      (cherry picked from commit df964950)
      0393dafd
  9. Jul 31, 2017
  10. Jul 28, 2017
  11. Jul 27, 2017
    • Jeff Vander Stoep's avatar
      netd: relax binder neverallow rules for hwservices · faaf86bc
      Jeff Vander Stoep authored
      Relax neverallow rule restricting binder access to/from netd so that
      netd can export hwbinder services to vendor components.
      
      Continue to disallow app access to netd via binder.
      
      Bug: 36682246
      Test: build
      Merged-In: I8e558ea1add6c36b966ec1da204062ea82df3f3f
      Change-Id: I063df6dded94d8b0f5214b2c94c4f46bdafb03d7
      faaf86bc
    • Jeff Vander Stoep's avatar
      netd: relax binder neverallow rules for hwservices · e98ab0cb
      Jeff Vander Stoep authored
      Relax neverallow rule restricting binder access to/from netd so that
      netd can export hwbinder services to vendor components.
      
      Continue to disallow app access to netd via binder.
      
      Bug: 36682246
      Test: build
      Change-Id: I8e558ea1add6c36b966ec1da204062ea82df3f3f
      (cherry picked from commit 07c650eb)
      e98ab0cb
  12. Jul 26, 2017
  13. Jul 25, 2017
  14. Jul 20, 2017
    • Josh Gao's avatar
      crash_dump_fallback: allow writing to system_server pipes. · fde0e02a
      Josh Gao authored
      Allow mediacodec/mediaextractor to write to system_server pipes during
      ANR dumps.
      
      Addresses the following denials:
      avc: denied { write } for comm="mediaextractor" path="pipe:[1177610]" dev="pipefs" ino=1177610 scontext=u:r:mediaextractor:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0
      avc: denied { write } for comm="omx@1.0-service" path="pipe:[1175808]" dev="pipefs" ino=1175808 scontext=u:r:mediacodec:s0 tcontext=u:r:system_server:s0 tclass=fifo_file permissive=0
      
      Bug: http://b/63801592
      Test: treehugger
      Change-Id: I944b1fa76c70402607ccd903be17dbddeaa73201
      (cherry picked from commit 3c9b9197)
      fde0e02a
  15. Jul 19, 2017
Loading