Skip to content
Snippets Groups Projects
  1. Jun 08, 2017
  2. Jun 01, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · ca595e11
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      ca595e11
  3. May 31, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · 50889ce0
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      50889ce0
  4. May 22, 2017
  5. Apr 21, 2017
    • Daniel Nicoara's avatar
      Remove vr_wm service selinux policy · 0e43e4e6
      Daniel Nicoara authored
      vr_wm functionality is moved in VrCore, so remove this service.
      
      Bug: 37542947, 36506799
      Test: Ran on device and verified there are no permission errors while in
      VR
      Change-Id: I37fd34e96babec2a990600907f61da8c358ecc89
      0e43e4e6
  6. Mar 31, 2017
    • Daniel Nicoara's avatar
      VR: Add sepolicy for VR HWC service · 6907e39a
      Daniel Nicoara authored
      VR HWC is being split out of VR Window Manager. It creates a HW binder
      interface used by SurfaceFlinger which implements the HWComposer HAL and
      a regular binder interface which will be used by a system app to receive
      the SurfaceFlinger output.
      
      Bug: b/36051907
      Test: Ran in permissive mode and ensured no permission errors show in
      logcat.
      
      Change-Id: If1360bc8fa339a80100124c4e89e69c64b29d2ae
      6907e39a
    • Andrew Scull's avatar
      SE Linux policies for OemLockService · 3717424d
      Andrew Scull authored
      Bug: 34766843
      Test: gts-tradefed run gts -m GtsBootloaderServiceTestCases -t \
            com.google.android.bootloader.gts.BootloaderServiceTest
      Change-Id: I8b939e0dbe8351a54f20c303921f606c3462c17d
      3717424d
  7. Mar 30, 2017
    • Chad Brubaker's avatar
      Further lock down access to services from ephemeral apps · 7d01a99a
      Chad Brubaker authored
      This removes access to
      * contexthub_service
      * device_policy_service
      * ethernet_service
      * fingerprint_service
      * shortcut_service
      * trust_service
      * usb_service
      
      Test: cts-tradefed run commandAndExit cts-dev -m
      CtsAppSecurityHostTestCases -t
      android.appsecurity.cts.EphemeralTest
      Bug: 33349998
      
      Change-Id: Iad9302041d7674ae6ebeb1c559c64d13df62c304
      7d01a99a
    • Nathan Harold's avatar
      Add IpSecService SEPolicy · 00674160
      Nathan Harold authored
      Add a new type and context for IpSec to system SEPolicy
      
      Bug: 35923241
      Test: service starts + talks to NetD
      Change-Id: I69356c8525b426d344fcc4858fc499ab12405b20
      (cherry picked from commit 641b1a7a)
      00674160
  8. Mar 23, 2017
    • Nathan Harold's avatar
      Add IpSecService SEPolicy · 641b1a7a
      Nathan Harold authored
      Add a new type and context for IpSec to system SEPolicy
      
      Bug: 35923241
      Test: service starts + talks to NetD
      Change-Id: I69356c8525b426d344fcc4858fc499ab12405b20
      641b1a7a
  9. Mar 07, 2017
    • Roshan Pius's avatar
      sepolicy: Make wpa_supplicant a HIDL service · a976e64d
      Roshan Pius authored
      Note: The existing rules allowing socket communication will be removed
      once we  migrate over to HIDL completely.
      
      (cherry-pick of 2a9595ed) 
      Bug: 34603782
      Test: Able to connect to wifi networks.
      Test: Will be sending for full wifi integration tests
      (go/wifi-test-request)
      Change-Id: I9ee238fd0017ec330f6eb67ef9049211f7bd4615
      a976e64d
  10. Mar 02, 2017
    • Alex Klyubin's avatar
      Start locking down access to services from ephemeral apps · 6237d8b7
      Alex Klyubin authored
      This starts with the reduction in the number of services that
      ephemeral apps can access. Prior to this commit, ephemeral apps were
      permitted to access most of the service_manager services accessible
      by conventional apps. This commit reduces this set by removing access
      from ephemeral apps to:
      * gatekeeper_service,
      * sec_key_att_app_id_provider_service,
      * wallpaper_service,
      * wifiaware_service,
      * wifip2p_service,
      * wifi_service.
      
      Test: Device boots up fine, Chrome, Play Movies, YouTube, Netflix, work fine.
      Bug: 33349998
      Change-Id: Ie4ff0a77eaca8c8c91efda198686c93c3a2bc4b3
      6237d8b7
    • Hugo Benichi's avatar
      removing obsolete entries for connectivity_metrics_logger · ee0b8cd9
      Hugo Benichi authored
      Test: build, flashed, booted.
      Bug: 32648597
      Change-Id: Ife3d99293c3274ad3a62fb71ae3f799c74e853f4
      ee0b8cd9
  11. Feb 28, 2017
  12. Feb 24, 2017
    • Roshan Pius's avatar
      sepolicy: Make wpa_supplicant a HIDL service · 2a9595ed
      Roshan Pius authored
      Note: The existing rules allowing socket communication will be removed
      once we  migrate over to HIDL completely.
      
      Bug: 34603782
      Test: Able to connect to wifi networks.
      Test: Will be sending for full wifi integration tests
      (go/wifi-test-request)
      Change-Id: I9ee238fd0017ec330f6eb67ef9049211f7bd4615
      2a9595ed
  13. Feb 22, 2017
  14. Feb 15, 2017
    • Alex Vakulenko's avatar
      Add SELinux policies for vr_window_manager · c5680561
      Alex Vakulenko authored
      This set of rules is neeeded to allow vr_windows_manager to run
      successfully on the system.
      
      Bug: 32541196
      Test: `m -j32` succeeds. Sailfish device boots.
      Change-Id: I0aec94d80f655a6f47691cf2622dd158ce9e475f
      c5680561
  15. Feb 09, 2017
  16. Feb 07, 2017
  17. Feb 04, 2017
  18. Feb 01, 2017
  19. Jan 25, 2017
    • Ray Essick's avatar
      rename mediaanalytics->mediametrics, wider access · 39185400
      Ray Essick authored
      reflect the change from "mediaanalytics" to "mediametrics"
      
      Also incorporates a broader access to the service -- e.g. anyone.
      This reflects that a number of metrics submissions come from application
      space and not only from our controlled, trusted media related processes.
      The metrics service (in another commit) checks on the source of any
      incoming metrics data and limits what is allowed from unprivileged
      clients.
      
      Bug: 34615027
      Test: clean build, service running and accessible
      Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
      39185400
  20. Jan 23, 2017
    • Clara Bayarri's avatar
      Declare new Fonts service · b69af83b
      Clara Bayarri authored
      Merged-In: Id2b849d7fa22989225066ebe487fc98d319743ea
      Bug: 34190490
      Test: CTS in internal master
      Change-Id: I27ab62469f3a405c59eda1a2a249899e845bed56
      b69af83b
  21. Jan 20, 2017
  22. Jan 19, 2017
  23. Jan 13, 2017
    • Jim Miller's avatar
      New SeLinux policy for fingerprint HIDL · 54e0e5af
      Jim Miller authored
      Move from fingerprintd to new fingerprint_hal and update SeLinux policy.
      
      Test: Boot with no errors related to fingerprint sepolicy
      Bug: 33199080
      Change-Id: Idfde0cb0530e75e705033042f64f3040f6df22d6
      54e0e5af
  24. Jan 11, 2017
  25. Jan 07, 2017
    • ynwang's avatar
      Storaged permissions for task I/O · e68d2d2c
      ynwang authored
      Allow storaged to read /proc/[pid]/io
      Grant binder access to storaged
      Add storaged service
      Grant storaged_exec access to dumpstate
      Grant storaged binder_call to dumpstate
      
      Bug: 32221677
      
      Change-Id: Iecc9dba266c5566817a99ac6251eb943a0bac630
      e68d2d2c
  26. Dec 19, 2016
    • Allen Hair's avatar
      Add coverage service. · 2328fec7
      Allen Hair authored
      Bug: 31077138
      Test: Device boots, coverage service works when tested manually.
      Change-Id: Ia855cfefd5c25be5d1d8db48908c04b3616b5504
      2328fec7
  27. Dec 05, 2016
    • Jeff Sharkey's avatar
      Rules for new installd Binder interface. · e160d14e
      Jeff Sharkey authored
      Most of this CL mirrors what we've already done for the "netd" Binder
      interface, while sorting a few lists alphabetically.
      
      Migrating installd to Binder will allow us to get rid of one of
      the few lingering text-based command protocols, improving system
      maintainability and security.
      
      Test: builds, boots
      Bug: 13758960, 30944031
      Change-Id: I59b89f916fd12e22f9813ace6673be38314c97b7
      e160d14e
  28. Dec 03, 2016
    • Ray Essick's avatar
      Allow access to mediaanalytics service · 090f4a4d
      Ray Essick authored
      media framework analytics are gathered in a separate service.
      define a context for this new service, allow various
      media-related services and libraries to access this new service.
      
      Bug: 30267133
      Test: ran media CTS, watched for selinux denials.
      Change-Id: I5aa5aaa5aa9e82465b8024f87ed32d6ba4db35ca
      090f4a4d
  29. Nov 04, 2016
    • Etan Cohen's avatar
      [NAN-AWARE] Remove NAN service · 43b96aaf
      Etan Cohen authored
      Finish NAN -> Aware rename process. Removes old NAN service.
      
      Bug: 32263750
      Test: device boots and all Wi-Fi unit-tests pass
      Change-Id: I2f0d9595efea2494b56074752194e7a6e66070f2
      43b96aaf
    • Etan Cohen's avatar
      [NAN-AWARE] Add Aware service · 44527cb9
      Etan Cohen authored
      Add Aware service - new name for NAN. But do not remove NAN
      yet. Enables smooth transition.
      
      Bug: 32263750
      Test: device boots and all Wi-Fi unit-tests pass
      Change-Id: Ieb9f1ebf1d2f31ee27f228562b4601023da5282d
      44527cb9
  30. Nov 01, 2016
    • Dianne Hackborn's avatar
      Allow new settings system service. · 11877133
      Dianne Hackborn authored
      Test: N/A
      Change-Id: Ib3c85118bf752152f5ca75ec13371073fc2873cc
      11877133
    • Felipe Leme's avatar
      Added permissions for the dumpstate service. · b5f5931e
      Felipe Leme authored
      - Allow dumpstate to create the dumpservice service.
      - Allow System Server and Shell to find that service.
      - Don't allow anyone else to create that service.
      - Don't allow anyone else to find that service.
      
      BUG: 31636879
      Test: manual verification
      Change-Id: I642fe873560a2b123e6bafde645467d45a5f5711
      b5f5931e
  31. Oct 21, 2016
  32. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  33. Sep 30, 2016
    • Janis Danisevskis's avatar
      fix lax service context lookup (II) · d6033b41
      Janis Danisevskis authored
      As fallout from the corresponding fix in libselinux,
      this patch adds the missing services without changing
      semantics.
      
      Test: bullhead builds and boots
      
      Bug: 31353148
      Change-Id: I21026c9435ffef956a59d61c4903174ac7b1ef95
      d6033b41
Loading