Skip to content
Snippets Groups Projects
  1. Sep 29, 2017
    • Etan Cohen's avatar
      [RTT2] policy change for Wi-Fi RTT (v2) framework · 4680cd96
      Etan Cohen authored
      A parallel Wi-Fi RTT service is being added in parallel. Switch-over
      will occur once the new service is ready.
      
      Bug: 65014552
      Test: integration tests
      Change-Id: Ie4b15592140462af70c7092511aee3f603aaa411
      4680cd96
  2. Sep 26, 2017
  3. Aug 16, 2017
    • Martijn Coenen's avatar
      Remove display.qservice from service_contexts. · e1887359
      Martijn Coenen authored
      This is a Qualcomm proprietary service,
      and does not belong here.
      
      Test: boot Marlin
      Bug: 63391760
      Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820
      Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
      e1887359
  4. Jul 01, 2017
  5. Jun 01, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · ca595e11
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      ca595e11
  6. Apr 21, 2017
    • Daniel Nicoara's avatar
      Remove vr_wm service selinux policy · 0e43e4e6
      Daniel Nicoara authored
      vr_wm functionality is moved in VrCore, so remove this service.
      
      Bug: 37542947, 36506799
      Test: Ran on device and verified there are no permission errors while in
      VR
      Change-Id: I37fd34e96babec2a990600907f61da8c358ecc89
      0e43e4e6
  7. Apr 20, 2017
  8. Apr 12, 2017
  9. Mar 31, 2017
    • Daniel Nicoara's avatar
      VR: Add sepolicy for VR HWC service · 6907e39a
      Daniel Nicoara authored
      VR HWC is being split out of VR Window Manager. It creates a HW binder
      interface used by SurfaceFlinger which implements the HWComposer HAL and
      a regular binder interface which will be used by a system app to receive
      the SurfaceFlinger output.
      
      Bug: b/36051907
      Test: Ran in permissive mode and ensured no permission errors show in
      logcat.
      
      Change-Id: If1360bc8fa339a80100124c4e89e69c64b29d2ae
      6907e39a
    • Andrew Scull's avatar
      SE Linux policies for OemLockService · 3717424d
      Andrew Scull authored
      Bug: 34766843
      Test: gts-tradefed run gts -m GtsBootloaderServiceTestCases -t \
            com.google.android.bootloader.gts.BootloaderServiceTest
      Change-Id: I8b939e0dbe8351a54f20c303921f606c3462c17d
      3717424d
  10. Mar 30, 2017
    • Nathan Harold's avatar
      Add IpSecService SEPolicy · 00674160
      Nathan Harold authored
      Add a new type and context for IpSec to system SEPolicy
      
      Bug: 35923241
      Test: service starts + talks to NetD
      Change-Id: I69356c8525b426d344fcc4858fc499ab12405b20
      (cherry picked from commit 641b1a7a)
      00674160
  11. Mar 23, 2017
    • Nathan Harold's avatar
      Add IpSecService SEPolicy · 641b1a7a
      Nathan Harold authored
      Add a new type and context for IpSec to system SEPolicy
      
      Bug: 35923241
      Test: service starts + talks to NetD
      Change-Id: I69356c8525b426d344fcc4858fc499ab12405b20
      641b1a7a
  12. Mar 07, 2017
    • Roshan Pius's avatar
      sepolicy: Make wpa_supplicant a HIDL service · a976e64d
      Roshan Pius authored
      Note: The existing rules allowing socket communication will be removed
      once we  migrate over to HIDL completely.
      
      (cherry-pick of 2a9595ed) 
      Bug: 34603782
      Test: Able to connect to wifi networks.
      Test: Will be sending for full wifi integration tests
      (go/wifi-test-request)
      Change-Id: I9ee238fd0017ec330f6eb67ef9049211f7bd4615
      a976e64d
  13. Mar 02, 2017
  14. Feb 28, 2017
  15. Feb 24, 2017
    • Roshan Pius's avatar
      sepolicy: Make wpa_supplicant a HIDL service · 2a9595ed
      Roshan Pius authored
      Note: The existing rules allowing socket communication will be removed
      once we  migrate over to HIDL completely.
      
      Bug: 34603782
      Test: Able to connect to wifi networks.
      Test: Will be sending for full wifi integration tests
      (go/wifi-test-request)
      Change-Id: I9ee238fd0017ec330f6eb67ef9049211f7bd4615
      2a9595ed
  16. Feb 22, 2017
  17. Feb 15, 2017
    • Alex Vakulenko's avatar
      Add SELinux policies for vr_window_manager · c5680561
      Alex Vakulenko authored
      This set of rules is neeeded to allow vr_windows_manager to run
      successfully on the system.
      
      Bug: 32541196
      Test: `m -j32` succeeds. Sailfish device boots.
      Change-Id: I0aec94d80f655a6f47691cf2622dd158ce9e475f
      c5680561
  18. Feb 09, 2017
  19. Feb 07, 2017
  20. Feb 04, 2017
  21. Feb 01, 2017
  22. Jan 25, 2017
    • Ray Essick's avatar
      rename mediaanalytics->mediametrics, wider access · 39185400
      Ray Essick authored
      reflect the change from "mediaanalytics" to "mediametrics"
      
      Also incorporates a broader access to the service -- e.g. anyone.
      This reflects that a number of metrics submissions come from application
      space and not only from our controlled, trusted media related processes.
      The metrics service (in another commit) checks on the source of any
      incoming metrics data and limits what is allowed from unprivileged
      clients.
      
      Bug: 34615027
      Test: clean build, service running and accessible
      Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
      39185400
  23. Jan 23, 2017
    • Clara Bayarri's avatar
      Declare new Fonts service · b69af83b
      Clara Bayarri authored
      Merged-In: Id2b849d7fa22989225066ebe487fc98d319743ea
      Bug: 34190490
      Test: CTS in internal master
      Change-Id: I27ab62469f3a405c59eda1a2a249899e845bed56
      b69af83b
  24. Jan 20, 2017
  25. Jan 11, 2017
  26. Jan 07, 2017
    • ynwang's avatar
      Storaged permissions for task I/O · e68d2d2c
      ynwang authored
      Allow storaged to read /proc/[pid]/io
      Grant binder access to storaged
      Add storaged service
      Grant storaged_exec access to dumpstate
      Grant storaged binder_call to dumpstate
      
      Bug: 32221677
      
      Change-Id: Iecc9dba266c5566817a99ac6251eb943a0bac630
      e68d2d2c
  27. Dec 27, 2016
    • Ashutosh Joshi's avatar
      Change the name advertised by the context hub service. · dea4975f
      Ashutosh Joshi authored
      Bring the context hub service advertised name into compliance with
      the other Android services. This changes the name from
      "contexthub_service" to "context".
      
      Test: GTS tests pass.
      
      Change-Id: I8490d60f89bdb97813e328b9ddf08270470fda76
      dea4975f
  28. Dec 21, 2016
    • Ashutosh Joshi's avatar
      Rename contexthub service. · 08530a3e
      Ashutosh Joshi authored
      The Context hub service was not conformant with the other
      Android services. As a part of renaming the service and making
      it compliant with tradition, the sepolicy must change to reflect
      the new name.
      
      Test: GTS tests pass.
      Change-Id: I1a666574f45a02e967d0ba97ce597ffb11b2b70b
      08530a3e
  29. Dec 19, 2016
    • Allen Hair's avatar
      Add coverage service. · 2328fec7
      Allen Hair authored
      Bug: 31077138
      Test: Device boots, coverage service works when tested manually.
      Change-Id: Ia855cfefd5c25be5d1d8db48908c04b3616b5504
      2328fec7
  30. Dec 05, 2016
    • Jeff Sharkey's avatar
      Rules for new installd Binder interface. · e160d14e
      Jeff Sharkey authored
      Most of this CL mirrors what we've already done for the "netd" Binder
      interface, while sorting a few lists alphabetically.
      
      Migrating installd to Binder will allow us to get rid of one of
      the few lingering text-based command protocols, improving system
      maintainability and security.
      
      Test: builds, boots
      Bug: 13758960, 30944031
      Change-Id: I59b89f916fd12e22f9813ace6673be38314c97b7
      e160d14e
  31. Dec 03, 2016
    • Ray Essick's avatar
      Allow access to mediaanalytics service · 090f4a4d
      Ray Essick authored
      media framework analytics are gathered in a separate service.
      define a context for this new service, allow various
      media-related services and libraries to access this new service.
      
      Bug: 30267133
      Test: ran media CTS, watched for selinux denials.
      Change-Id: I5aa5aaa5aa9e82465b8024f87ed32d6ba4db35ca
      090f4a4d
  32. Nov 04, 2016
    • Etan Cohen's avatar
      [NAN-AWARE] Remove NAN service · 43b96aaf
      Etan Cohen authored
      Finish NAN -> Aware rename process. Removes old NAN service.
      
      Bug: 32263750
      Test: device boots and all Wi-Fi unit-tests pass
      Change-Id: I2f0d9595efea2494b56074752194e7a6e66070f2
      43b96aaf
    • Etan Cohen's avatar
      [NAN-AWARE] Add Aware service · 44527cb9
      Etan Cohen authored
      Add Aware service - new name for NAN. But do not remove NAN
      yet. Enables smooth transition.
      
      Bug: 32263750
      Test: device boots and all Wi-Fi unit-tests pass
      Change-Id: Ieb9f1ebf1d2f31ee27f228562b4601023da5282d
      44527cb9
  33. Nov 01, 2016
    • Dianne Hackborn's avatar
      Allow new settings system service. · 11877133
      Dianne Hackborn authored
      Test: N/A
      Change-Id: Ib3c85118bf752152f5ca75ec13371073fc2873cc
      11877133
    • Felipe Leme's avatar
      Added permissions for the dumpstate service. · b5f5931e
      Felipe Leme authored
      - Allow dumpstate to create the dumpservice service.
      - Allow System Server and Shell to find that service.
      - Don't allow anyone else to create that service.
      - Don't allow anyone else to find that service.
      
      BUG: 31636879
      Test: manual verification
      Change-Id: I642fe873560a2b123e6bafde645467d45a5f5711
      b5f5931e
  34. Oct 21, 2016
  35. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  36. Sep 30, 2016
    • Janis Danisevskis's avatar
      fix lax service context lookup (II) · d6033b41
      Janis Danisevskis authored
      As fallout from the corresponding fix in libselinux,
      this patch adds the missing services without changing
      semantics.
      
      Test: bullhead builds and boots
      
      Bug: 31353148
      Change-Id: I21026c9435ffef956a59d61c4903174ac7b1ef95
      d6033b41
Loading