- Dec 27, 2018
-
-
Dario Freni authored
Adding a new high-level service which will handle staged installs, i.e. installs that require a reboot. Bug: 118865310 Test: An initial implementation of StagingManager can be reached successfully by PackageManagerService and PackageInstallerService. Change-Id: I8859b463575f8ee85caae43570958347b82f967e
-
Michael Groover authored
Test: manually verified SensorPrivacyService is accessible Bug: 110842805 Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f (cherry picked from commit 0ac3dea7)
-
- Dec 21, 2018
-
-
Remi NGUYEN VAN authored
The policies allow the system server to register a network_stack_service used to communicate with the network stack process. Test: atest FrameworksNetTests Bug: b/112869080 Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
-
- Dec 20, 2018
-
-
Todd Kennedy authored
There are many permission related APIs currently handled by the package manager service. These are simply pass throughs from the package manager service to an internal API defined by the permission manager service. Instead of this multi-hop, we want to open the permission manager service directly to apps. For legacy, we won't be able to remove the APIs from PackageManager, but, the implementation should go directly to the Permission Manager Service. Test: System boots w/o selinux denials Change-Id: I1d953077b3da18ccf44deb85b9084be68a2179bd
-
- Dec 19, 2018
-
-
Nick Kralevich authored
Add a neverallow rule asserting that services registered or queried through servicemanager must have the attribute service_manager_type or vndservice_manager_type. Attempting to add or query a service which does not have one of those attributes is malformed policy. See https://android-review.googlesource.com/c/platform/system/sepolicy/+/826500/7/private/system_server.te#696 as an example where this occurred. Test: compiles Change-Id: I339bde04b80819b07832d96797fd7f477a4b676a
-
- Dec 18, 2018
-
-
Winson Chung authored
Bug: 120865921 Test: Manual verification Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
-
- Dec 17, 2018
-
-
Todd Kennedy authored
We're creating a new PermissionManagerService that will handle all of the permission related APIs. These are currently being routed through PackageManagerService. Test: Device boots Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
-
- Dec 14, 2018
-
-
Felipe Leme authored
Bug: 111276913 Test: manual verification Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab (cherry picked from commit 73e7fa88)
-
- Dec 12, 2018
-
-
Sunny Goyal authored
- Update policy for new system service, used for SystemUI/Apps to present predicted apps in their UI. Bug: 111701043 Test: manual verification Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
-
- Dec 11, 2018
-
-
Wei Wang authored
Thermal API has been added to PowerManager and this CL is to grant IThermal access to app. Bug: 119613338 Test: PowerManager CTS test Change-Id: I977530a9a5490bdc53af1548788b885e7c649f01
- Dec 07, 2018
-
-
Matt Pape authored
Add a DeviceConfig service in system_server to edit configuration flags. This is intended to be a command line tool for local overrides and/or tool for tests that adopt shell permissions. Test: None Bug:109919982 Bug:113101834 Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
-
- Dec 03, 2018
-
-
Neil Fuller authored
Adds the necessary incantations for the new service. Bug: 118242715 Bug: 119026403 Test: build / boot / adb shell dumpsys Change-Id: Ibb1a356067863316d70586a61ede9f5973c1ae15
-
- Nov 16, 2018
-
-
Robert Carr authored
Add an InputFlinger service in system_server and allow SurfaceFlinger to exchange sockets with it. Test: None Bug: 80101428 Bug: 113136004 Bug: 111440400 Change-Id: I1533ab7a1da0ca61d8a28037fffbc189d796f737
-
- Nov 15, 2018
-
-
Mårten Kongstad authored
Bug: 78815803 Test: builds, boots Test: manual: adb shell idmap2 create ... Test: manual: adb shell ps | grep -e idmap2d Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
-
- Nov 12, 2018
-
-
Eugene Susla authored
Test: ensure no build failures; add RoleManagerService as a boot phase ensure no SecurityException in logcat on boot Change-Id: Ia0803c0fb084fe2b12f5c20f5e46354d0dd1aedf
-
- Nov 07, 2018
-
-
Kevin Chyn authored
See aosp/660242 and aosp/608396 Fixes: 116530289 Test: builds Change-Id: I220ece0d6751839fe764ff91fd7bd20c50104f8f
-
- Nov 05, 2018
-
-
Felipe Leme authored
Bug: 111276913 Test: manual verification Change-Id: Icb309bb07e4e4b39cdc912b1d3dc1ece9cb55f5f
-
Kenny Root authored
Mark the ADB service as a system_api_service so that SystemUI can tell it that the device is accepted. Refactoring split the AdbService out of the UsbService. UsbService is marked as an app_api_service which SystemUI is allowed to connect to; AdbService must be marked similarly as either system_api_service or app_api_service. However, only system apps should talk to AdbService currently. SELinux : avc: denied { find } for service=adb pid=1737 uid=10041 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:adb_service:s0 tclass=service_manager permissive=0 Introduced in Change-Id Ibf23964665a115a5bc835820dcff98aaf7ba610f Test: Flash userdebug, accept ADB key, and replug USB Bug: 118999282 Change-Id: I47b5090908ed84d0ba7a9fca100b299011bf8796
-
- Oct 08, 2018
-
-
Igor Murashkin authored
This daemon is very locked down. Only system_server can access it. Bug: 72170747 Change-Id: I7b72b9191cb192be96001d84d067c28292c9688f
-
- Oct 04, 2018
-
-
Christine Franks authored
Bug: 111215474 Test: boots Change-Id: Ib8cabeb64a8b4ec9f592d870bd0af611a2720cc7
-
Martijn Coenen authored
apexd is a new daemon for managing APEX packages installed on the device. It hosts a single binder service, "apexservice". Bug: 112455435 Test: builds, binder service can be registered, apexes can be accessed, verified and mounted Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
-
- Sep 21, 2018
-
-
Kevin Chyn authored
Bug: 111461540 Bug: 112570477 Test: builds Change-Id: Icc68720ebe931c2d917703b2d34aa0f4eec3f549 Merged-In: Icc68720ebe931c2d917703b2d34aa0f4eec3f549
-
- Sep 06, 2018
-
-
Marcin Oczeretko authored
Test: Built and flashed an image. Bug: 113651685 Change-Id: Ide239432ea8a5701d91c00edd06ad3e52560a3f7
-
- Sep 05, 2018
-
-
Makoto Onuki authored
Bug: 109809543 Test: Build and boot with the new service in the internal branch. Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
-
- Aug 30, 2018
-
-
Kevin Chyn authored
Bug: 72825012 Test: manual Change-Id: I850c869cdc0ad8735800130bb4a8d67822197ff9
-
- Aug 22, 2018
-
-
Christine Franks authored
Bug: 111215474 Test: boots Change-Id: I98955bcd02f643400c3eb97232467c09a2c5c1e5
-
- Jul 23, 2018
-
-
Wale Ogunwale authored
Bug: 80414790 Test: boots Change-Id: I15233721fa138e0fdf1a30f66d52b64cbab18b81
-
- Jul 14, 2018
-
-
Steven Thomas authored
Add selinux policy for the new Binder-based vr flinger vsync service. Bug: 72890037 Test: - Manually confirmed that I can't bind to the new vsync service from a normal Android application, and system processes (other than vr_hwc) are prevented from connecting by selinux. - Confirmed the CTS test android.security.cts.SELinuxHostTest#testAospServiceContexts, when built from the local source tree with this CL applied, passes. - Confirmed the CTS test android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules521, when built from the local source tree with this CL applied, passes. Change-Id: Ib7a6bfcb1c2ebe1051f3accc18b481be1b188b06
-
- Jun 19, 2018
-
-
Neil Fuller authored
Add sepolicy entries for the new time zone detector service. The timezonedetector_service will be called from the telephony process. Bug: 78217059 Test: make / booted device Change-Id: Ib719a4bb444b2af7dd71910fb0bd12992df9d88c
-
- Jun 06, 2018
-
-
Neil Fuller authored
This change removes references to the common time management service. Bug: 80462439 Test: build / boot Merged-In: I2c8fca44fe05e3a35f5580d23e23a4c033075613 Change-Id: I2c8fca44fe05e3a35f5580d23e23a4c033075613
-
- Jun 05, 2018
-
-
Wale Ogunwale authored
Bug: 80414790 Test: boots Change-Id: I3d6bb4e7da9d697ec8ff7502880543be89aee349
-
- Jun 04, 2018
-
-
Neil Fuller authored
This commit contains the changes needed to add the new time detector system server service. Bug: 78217059 Test: make / booted device Change-Id: I7cfaac6cac876e4aa73e8af1aa5f837117bb9ad7
-
- Mar 21, 2018
-
-
Fyodor Kupolov authored
Test: manual Bug: 75318418 Merged-In: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7 Change-Id: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7
-
- Mar 20, 2018
-
-
Fyodor Kupolov authored
Test: manual Bug: 75318418 Change-Id: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7
-
- Mar 07, 2018
-
-
Kenny Root authored
ADB is being separated from USB service since it's not tied to the USB transport. This duplicates the usb_service's settings to adb_service for this purpose. Bug: 63820489 Test: make Change-Id: Idbcfbe470d7568f9cba51f0c8d4a8ee9503db93d
-
- Jan 29, 2018
-
-
Ruchi Kandoi authored
Test: App startup on boot Change-Id: I7740aafc088aadf676328e3f1bb8db5175d97102
-
- Jan 23, 2018
-
-
Dongwon Kang authored
This is an experimental feature only on userdebug and eng build. Test: play MP4 file. install & uninstall media update apk. Bug: 67908547 Change-Id: I513cdbfda962f00079e886b7a42f9928e81f6474
-