Skip to content
Snippets Groups Projects
  1. Aug 26, 2016
    • Roshan Pius's avatar
      sepolicy: Add permissions for wpa_supplicant binder · 7c539b1c
      Roshan Pius authored
      Add the necessary permissions for |wpa_supplicant| to expose a binder
      interface. This binder interface will be used by the newly added
      |wificond| service (and potentially system_server).
      |wpa_supplicant| also needs to invoke binder callbacks on |wificond|.
      
      Changes in the CL:
      1. Allow |wpa_supplicant| to register binder service.
      2. Allow |wpa_supplicant| to invoke binder calls on |wificond|.
      3. Allow |wificond| to invoke binder calls on |wpa_supplicant|
      
      Denials:
      06-30 08:14:42.788   400   400 E SELinux : avc:  denied  { add } for
      service=wpa_supplicant pid=20756 uid=1010 scontext=u:r:wpa:s0
      tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      permissive=1
      
      BUG:29877467
      TEST: Compiled and ensured that the selinux denials are no longer
      present in logs.
      TEST: Ran integration test to find the service.
      
      Change-Id: Ib78d8e820fc81b2c3d9260e1c877c5faa9f1f662
      (cherry picked from commit 18883a93)
      7c539b1c
    • Ningyuan Wang's avatar
      sepolicy: add sepolicy binder support for wificond · b83c8cb1
      Ningyuan Wang authored
      This allows wificond to publish binder interface using
      service manager.
      
      Denial warnings:
      
      wificond: type=1400 audit(0.0:8): avc:
      denied { call } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      wificond: type=1400 audit(0.0:9): avc:
      denied { transfer } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      servicemanager: type=1400
      audit(0.0:10): avc: denied { search } for name="6085" dev="proc"
      ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=dir permissive=1
      
      servicemanager: type=1400
      audit(0.0:11): avc: denied { read } for name="current" dev="proc"
      ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current"
      dev="proc" ino=40641 scontext=u:r:servicemanager:s0
      tcontext=u:r:wificond:s0 tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:13): avc: denied { getattr } for
      scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process
      permissive=1
      
      SELinux : avc:  denied  { add } for
      service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0
      tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1
      
      BUG=28867093
      TEST=compile
      TEST=use a client to call wificond service through binder
      
      Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
      (cherry picked from commit d56bcb1c)
      b83c8cb1
  2. May 05, 2016
    • Philip Cuadra's avatar
      Add CAP_IPC_LOCK and pinner to system_server · 96da70eb
      Philip Cuadra authored
      Add pinner service to system_service services.
      Add CAP_IPC_LOCK permissions to system_server in order to allow
      system_server to pin more memory than the lockedmem ulimit.
      
      bug 28251566
      
      Change-Id: I990c73d25fce4f2cc9a2db0015aa238fa7b0e984
      96da70eb
  3. Apr 13, 2016
    • Lorenzo Colitti's avatar
      selinux changes for DNS metrics. · 71d6ddc3
      Lorenzo Colitti authored
      1. Allow the system server to create the dns_listener service.
      2. Allow netd to use said service.
      
      Change-Id: Ic6394d7b2bdebf1c4d6cf70a79754a4996e943e2
      71d6ddc3
  4. Apr 06, 2016
  5. Apr 01, 2016
  6. Mar 15, 2016
    • Peng Xu's avatar
      Create SELinux label for contexhub_service · 1c50994e
      Peng Xu authored
      SELinux label is created for contexthub_service system service.
      
      ContextHub service manages all available context hubs and serves fulfil communication between apps
      and underlying context hub hardware.
      
      Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
      1c50994e
  7. Mar 14, 2016
    • dcashman's avatar
      Mark batteryproperties service as app_api_service. · 027ec206
      dcashman authored
      Applications do not explicitly request handles to the batteryproperties
      service, but the BatteryManager obtains a reference to it and uses it
      for its underlying property queries.  Mark it as an app_api_service so
      that all applications may use this API.  Also remove the batterypropreg
      service label, as this does not appear to be used and may have been a
      duplication of batteryproperties.  As a result, remove the
      healthd_service type and replace it with a more specific
      batteryproperties_service type.
      
      (cherry-picked from commit: 9ed71eff)
      
      Bug: 27442760
      Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
      027ec206
    • dcashman's avatar
      Mark batteryproperties service as app_api_service. · 9ed71eff
      dcashman authored
      Applications do not explicitly request handles to the batteryproperties
      service, but the BatteryManager obtains a reference to it and uses it
      for its underlying property queries.  Mark it as an app_api_service so
      that all applications may use this API.  Also remove the batterypropreg
      service label, as this does not appear to be used and may have been a
      duplication of batteryproperties.  As a result, remove the
      healthd_service type and replace it with a more specific
      batteryproperties_service type.
      
      Bug: 27442760
      Change-Id: I5c0f9d7992ff2ec64adaeef22356e88fd0e8169c
      9ed71eff
  8. Mar 09, 2016
  9. Mar 01, 2016
  10. Feb 27, 2016
    • Fyodor Kupolov's avatar
      Add NetworkTimeUpdateService · 3d564e52
      Fyodor Kupolov authored
      NetworkTimeUpdateService has been registered as a system service, so that
      its dump state can be included into bugreports.
      
      Bug: 23983739
      Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
      3d564e52
  11. Feb 23, 2016
  12. Feb 22, 2016
    • Tao Bao's avatar
      Add recovery service. · 45f8e4af
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      (cherry picked from commit 65b5fde9)
      45f8e4af
    • Tao Bao's avatar
      Add recovery service. · 65b5fde9
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      65b5fde9
  13. Feb 18, 2016
    • Lorenzo Colitti's avatar
      Allow the framework to communicate with netd via a binder service · 24dcc8b1
      Lorenzo Colitti authored
      This will allow us to provide a better interface between Java
      services (e.g., ConnectivityService) and netd than the current
      FrameworkListener / NativeDaemonConnector interface which uses
      text strings over a Unix socket.
      
      Bug: 27239233
      Change-Id: If40582ae2820e54f1960556b7bf7e88d98c525af
      24dcc8b1
  14. Feb 17, 2016
  15. Feb 13, 2016
    • Jeff Tinker's avatar
      Add mediadrm service · 0d5bac13
      Jeff Tinker authored
      Part of media security hardening
      
      This is an intermediate step toward moving
      mediadrm to a new service separate from mediaserver.
      This first step allows mediadrmservice to run based
      on the system property media.mediadrmservice.enable
      so it can be selectively enabled on devices that
      support using native_handles for secure buffers.
      
      bug: 22990512
      Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
      0d5bac13
  16. Feb 09, 2016
    • Tao Bao's avatar
      update_engine: Allow to access bootctrl_block_device. · 79db4e47
      Tao Bao authored
      update_engine needs to access bootctrl_block_device to get and set the slot to boot.
      avc: denied { write } for name="mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      
      Also track the name change of the native binder service.
      avc:  denied  { add } for service=android.os.UpdateEngineService pid=210 uid=0 scontext=u:r:update_engine:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      
      Bug: 27106053
      Change-Id: Idbfef18578489db33fead0721e8f26d63db5ce09
      (cherry picked from commit 3ec34ceb)
      79db4e47
    • Tao Bao's avatar
      update_engine: Allow to access bootctrl_block_device. · 3ec34ceb
      Tao Bao authored
      update_engine needs to access bootctrl_block_device to get and set the slot to boot.
      avc: denied { write } for name="mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      avc: denied { open } for path="/dev/block/mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
      
      Also track the name change of the native binder service.
      avc:  denied  { add } for service=android.os.UpdateEngineService pid=210 uid=0 scontext=u:r:update_engine:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      
      Bug: 27106053
      Change-Id: Idbfef18578489db33fead0721e8f26d63db5ce09
      3ec34ceb
    • Marco Nelissen's avatar
      selinux rules for codec process · c3ba2e51
      Marco Nelissen authored
      Bug: 22775369
      
      Change-Id: Ic6abe3d0e18ba6f7554d027e0ec05fd19011709b
      c3ba2e51
  17. Feb 05, 2016
  18. Jan 28, 2016
  19. Jan 27, 2016
  20. Jan 26, 2016
    • Arunesh Mishra's avatar
      Allow "soundtrigger" system service to run. · 400266bf
      Arunesh Mishra authored
      In the same process as voiceinteraction.
      
      Please see related CL ag/852049
      
      Bug: 22860713
      Change-Id: I43ebfdba2aafb151dd7db0814570027e1164508a
      400266bf
    • Tao Bao's avatar
      Allow update_engine to use Binder IPC. · dce317cf
      Tao Bao authored
      Register service with servicemanager and name the context.
      
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      
      Also allow priv_app to communicate with update_engine.
      
      avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
      
      Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
      dce317cf
  21. Jan 22, 2016
  22. Jan 12, 2016
  23. Dec 08, 2015
  24. Oct 27, 2015
  25. Oct 22, 2015
  26. Sep 25, 2015
  27. May 20, 2015
  28. Apr 07, 2015
    • dcashman's avatar
      Enforce more specific service access. · d4c78f4b
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      battery
      bluetooth_manager
      clipboard
      commontime_management
      connectivity
      content
      country_detector
      device_policy
      deviceidle
      
      Bug: 18106000
      Change-Id: I0d0f2a075c0509a783631d88ba453ac13399cdf2
      d4c78f4b
  29. Apr 06, 2015
    • Andres Morales's avatar
      SELinux permissions for gatekeeper TEE proxy · e207986e
      Andres Morales authored
      sets up:
      - execute permissions
      - binder permission (system_server->gatekeeper->keystore)
      - prevents dumpstate and shell from finding GK binder service
      - neverallow rules for prohibited clients
      
      Change-Id: I1817933a91de625db469a20c7a4c8e2ca46efa1e
      e207986e
  30. Apr 03, 2015
    • dcashman's avatar
      Add system_api_service and app_api_service attributes. · d12993f0
      dcashman authored
      System services differ in designed access level.  Add attributes reflecting this
      distinction and label services appropriately.  Begin moving access to the newly
      labeled services by removing them from tmp_system_server_service into the newly
      made system_server_service attribute.  Reflect the move of system_server_service
      from a type to an attribute by removing access to system_server_service where
      appropriate.
      
      Change-Id: I7fd06823328daaea6d6f96e4d6bd00332382230b
      d12993f0
  31. Mar 27, 2015
  32. Mar 25, 2015
  33. Mar 19, 2015
Loading