Skip to content
Snippets Groups Projects
  1. Nov 01, 2016
    • Felipe Leme's avatar
      Added permissions for the dumpstate service. · b5f5931e
      Felipe Leme authored
      - Allow dumpstate to create the dumpservice service.
      - Allow System Server and Shell to find that service.
      - Don't allow anyone else to create that service.
      - Don't allow anyone else to find that service.
      
      BUG: 31636879
      Test: manual verification
      Change-Id: I642fe873560a2b123e6bafde645467d45a5f5711
      b5f5931e
  2. Oct 21, 2016
  3. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  4. Sep 30, 2016
    • Janis Danisevskis's avatar
      fix lax service context lookup (II) · d6033b41
      Janis Danisevskis authored
      As fallout from the corresponding fix in libselinux,
      this patch adds the missing services without changing
      semantics.
      
      Test: bullhead builds and boots
      
      Bug: 31353148
      Change-Id: I21026c9435ffef956a59d61c4903174ac7b1ef95
      d6033b41
  5. Sep 21, 2016
  6. Sep 19, 2016
    • Svet Ganov's avatar
      Move device serial behing a permission - selinux · 3286fca7
      Svet Ganov authored
      Build serial is non-user resettable freely available device
      identifier. It can be used by ad-netowrks to track the user
      across apps which violates the user's privacy.
      
      This change deprecates Build.SERIAL and adds a new Build.getSerial()
      API which requires holding the read_phone_state permission.
      The Build.SERIAL value is set to "undefined" for apps targeting
      high enough SDK and for legacy app the value is still available.
      
      bug:31402365
      
      Change-Id: I6309aa58c8993b3db4fea7b55aae05592408b6e4
      3286fca7
  7. Sep 14, 2016
  8. Aug 26, 2016
    • Roshan Pius's avatar
      sepolicy: Add permissions for wpa_supplicant binder · 7c539b1c
      Roshan Pius authored
      Add the necessary permissions for |wpa_supplicant| to expose a binder
      interface. This binder interface will be used by the newly added
      |wificond| service (and potentially system_server).
      |wpa_supplicant| also needs to invoke binder callbacks on |wificond|.
      
      Changes in the CL:
      1. Allow |wpa_supplicant| to register binder service.
      2. Allow |wpa_supplicant| to invoke binder calls on |wificond|.
      3. Allow |wificond| to invoke binder calls on |wpa_supplicant|
      
      Denials:
      06-30 08:14:42.788   400   400 E SELinux : avc:  denied  { add } for
      service=wpa_supplicant pid=20756 uid=1010 scontext=u:r:wpa:s0
      tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      permissive=1
      
      BUG:29877467
      TEST: Compiled and ensured that the selinux denials are no longer
      present in logs.
      TEST: Ran integration test to find the service.
      
      Change-Id: Ib78d8e820fc81b2c3d9260e1c877c5faa9f1f662
      (cherry picked from commit 18883a93)
      7c539b1c
    • Ningyuan Wang's avatar
      sepolicy: add sepolicy binder support for wificond · b83c8cb1
      Ningyuan Wang authored
      This allows wificond to publish binder interface using
      service manager.
      
      Denial warnings:
      
      wificond: type=1400 audit(0.0:8): avc:
      denied { call } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      wificond: type=1400 audit(0.0:9): avc:
      denied { transfer } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      servicemanager: type=1400
      audit(0.0:10): avc: denied { search } for name="6085" dev="proc"
      ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=dir permissive=1
      
      servicemanager: type=1400
      audit(0.0:11): avc: denied { read } for name="current" dev="proc"
      ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current"
      dev="proc" ino=40641 scontext=u:r:servicemanager:s0
      tcontext=u:r:wificond:s0 tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:13): avc: denied { getattr } for
      scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process
      permissive=1
      
      SELinux : avc:  denied  { add } for
      service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0
      tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1
      
      BUG=28867093
      TEST=compile
      TEST=use a client to call wificond service through binder
      
      Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
      (cherry picked from commit d56bcb1c)
      b83c8cb1
  9. May 05, 2016
    • Philip Cuadra's avatar
      Add CAP_IPC_LOCK and pinner to system_server · 96da70eb
      Philip Cuadra authored
      Add pinner service to system_service services.
      Add CAP_IPC_LOCK permissions to system_server in order to allow
      system_server to pin more memory than the lockedmem ulimit.
      
      bug 28251566
      
      Change-Id: I990c73d25fce4f2cc9a2db0015aa238fa7b0e984
      96da70eb
  10. Apr 13, 2016
    • Lorenzo Colitti's avatar
      selinux changes for DNS metrics. · 71d6ddc3
      Lorenzo Colitti authored
      1. Allow the system server to create the dns_listener service.
      2. Allow netd to use said service.
      
      Change-Id: Ic6394d7b2bdebf1c4d6cf70a79754a4996e943e2
      71d6ddc3
  11. Apr 11, 2016
    • Peng Xu's avatar
      Allow all apps to discover contexthub_service · 7df44d82
      Peng Xu authored
      This allows system app, regular app as well as test app to access
      ContextHubManager API. Additional "signature|privilige" permission
      requirement (LOCATION_HARDWARE) still exist to prevent security
      issues, misuse and abuse.
      
      Change-Id: I47f3d243a3de7f1202c933fc715a935c43cf319b
      7df44d82
  12. Apr 06, 2016
  13. Apr 01, 2016
  14. Mar 22, 2016
  15. Mar 15, 2016
    • Peng Xu's avatar
      Create SELinux label for contexhub_service · 1c50994e
      Peng Xu authored
      SELinux label is created for contexthub_service system service.
      
      ContextHub service manages all available context hubs and serves fulfil communication between apps
      and underlying context hub hardware.
      
      Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
      1c50994e
  16. Mar 14, 2016
    • dcashman's avatar
      Mark batteryproperties service as app_api_service. · 027ec206
      dcashman authored
      Applications do not explicitly request handles to the batteryproperties
      service, but the BatteryManager obtains a reference to it and uses it
      for its underlying property queries.  Mark it as an app_api_service so
      that all applications may use this API.  Also remove the batterypropreg
      service label, as this does not appear to be used and may have been a
      duplication of batteryproperties.  As a result, remove the
      healthd_service type and replace it with a more specific
      batteryproperties_service type.
      
      (cherry-picked from commit: 9ed71eff)
      
      Bug: 27442760
      Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
      027ec206
    • dcashman's avatar
      Mark batteryproperties service as app_api_service. · 9ed71eff
      dcashman authored
      Applications do not explicitly request handles to the batteryproperties
      service, but the BatteryManager obtains a reference to it and uses it
      for its underlying property queries.  Mark it as an app_api_service so
      that all applications may use this API.  Also remove the batterypropreg
      service label, as this does not appear to be used and may have been a
      duplication of batteryproperties.  As a result, remove the
      healthd_service type and replace it with a more specific
      batteryproperties_service type.
      
      Bug: 27442760
      Change-Id: I5c0f9d7992ff2ec64adaeef22356e88fd0e8169c
      9ed71eff
  17. Mar 09, 2016
  18. Mar 01, 2016
  19. Feb 27, 2016
    • Fyodor Kupolov's avatar
      Add NetworkTimeUpdateService · 3d564e52
      Fyodor Kupolov authored
      NetworkTimeUpdateService has been registered as a system service, so that
      its dump state can be included into bugreports.
      
      Bug: 23983739
      Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
      3d564e52
  20. Feb 23, 2016
  21. Feb 22, 2016
    • Tao Bao's avatar
      Add recovery service. · 45f8e4af
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      (cherry picked from commit 65b5fde9)
      45f8e4af
    • Tao Bao's avatar
      Add recovery service. · 65b5fde9
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      65b5fde9
  22. Feb 18, 2016
    • Lorenzo Colitti's avatar
      Allow the framework to communicate with netd via a binder service · 24dcc8b1
      Lorenzo Colitti authored
      This will allow us to provide a better interface between Java
      services (e.g., ConnectivityService) and netd than the current
      FrameworkListener / NativeDaemonConnector interface which uses
      text strings over a Unix socket.
      
      Bug: 27239233
      Change-Id: If40582ae2820e54f1960556b7bf7e88d98c525af
      24dcc8b1
  23. Feb 17, 2016
  24. Feb 13, 2016
    • Jeff Tinker's avatar
      Add mediadrm service · 0d5bac13
      Jeff Tinker authored
      Part of media security hardening
      
      This is an intermediate step toward moving
      mediadrm to a new service separate from mediaserver.
      This first step allows mediadrmservice to run based
      on the system property media.mediadrmservice.enable
      so it can be selectively enabled on devices that
      support using native_handles for secure buffers.
      
      bug: 22990512
      Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
      0d5bac13
  25. Feb 10, 2016
    • dcashman's avatar
      Make voiceinteractionservice app_api_service. · 8f5a891f
      dcashman authored
      Address the following denial from 3rd party voice interaction test:
      SELinux : avc:  denied  { find } for service=voiceinteraction pid=30281 uid=10139 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=0
      
      Bug: 27105570
      Change-Id: Ib87d364673cbc883df017bcda7fe1e854a76654f
      8f5a891f
  26. Feb 09, 2016
  27. Feb 05, 2016
  28. Jan 28, 2016
  29. Jan 27, 2016
  30. Jan 26, 2016
    • dcashman's avatar
      Reduce accessibility of voiceinteraction_service. · aedf2236
      dcashman authored
      The services under this label are not meant to be exposed to all apps.
      Currently only priv_app needs access.
      
      Bug: 26799206
      Change-Id: I07c60752d6ba78f27f90bf5075bcab47eba90b55
      aedf2236
    • Tao Bao's avatar
      Allow update_engine to use Binder IPC. · dce317cf
      Tao Bao authored
      Register service with servicemanager and name the context.
      
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      
      Also allow priv_app to communicate with update_engine.
      
      avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
      
      Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
      dce317cf
  31. Jan 22, 2016
  32. Dec 08, 2015
  33. Nov 19, 2015
    • Jeff Vander Stoep's avatar
      grant country_detector_service app_api_service attribute · 9d8728db
      Jeff Vander Stoep authored
      All apps should have access to the country_detector service.
      
      avc:  denied  { find } for service=country_detector pid=1802 uid=1010002 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:country_detector_service:s0 tclass=service_manager
      
      Bug: 25766732
      Change-Id: Ie3f1a801114030dada7ad70c715a62907a2d264f
      9d8728db
  34. Nov 18, 2015
    • Jeff Vander Stoep's avatar
      grant country_detector_service app_api_service attribute · 1e1d65a3
      Jeff Vander Stoep authored
      All apps should have access to the country_detector service.
      
      avc:  denied  { find } for service=country_detector pid=1802 uid=1010002 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:country_detector_service:s0 tclass=service_manager
      
      Bug: 25766732
      Change-Id: Ie3f1a801114030dada7ad70c715a62907a2d264f
      1e1d65a3
Loading