Skip to content
Snippets Groups Projects
  1. Mar 15, 2016
    • Peng Xu's avatar
      Create SELinux label for contexhub_service · 1c50994e
      Peng Xu authored
      SELinux label is created for contexthub_service system service.
      
      ContextHub service manages all available context hubs and serves fulfil communication between apps
      and underlying context hub hardware.
      
      Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
      1c50994e
  2. Mar 14, 2016
    • dcashman's avatar
      Mark batteryproperties service as app_api_service. · 027ec206
      dcashman authored
      Applications do not explicitly request handles to the batteryproperties
      service, but the BatteryManager obtains a reference to it and uses it
      for its underlying property queries.  Mark it as an app_api_service so
      that all applications may use this API.  Also remove the batterypropreg
      service label, as this does not appear to be used and may have been a
      duplication of batteryproperties.  As a result, remove the
      healthd_service type and replace it with a more specific
      batteryproperties_service type.
      
      (cherry-picked from commit: 9ed71eff)
      
      Bug: 27442760
      Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
      027ec206
  3. Mar 09, 2016
  4. Mar 01, 2016
  5. Feb 27, 2016
    • Fyodor Kupolov's avatar
      Add NetworkTimeUpdateService · 3d564e52
      Fyodor Kupolov authored
      NetworkTimeUpdateService has been registered as a system service, so that
      its dump state can be included into bugreports.
      
      Bug: 23983739
      Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
      3d564e52
  6. Feb 23, 2016
  7. Feb 22, 2016
    • Tao Bao's avatar
      Add recovery service. · 45f8e4af
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      (cherry picked from commit 65b5fde9)
      45f8e4af
  8. Feb 18, 2016
    • Lorenzo Colitti's avatar
      Allow the framework to communicate with netd via a binder service · 24dcc8b1
      Lorenzo Colitti authored
      This will allow us to provide a better interface between Java
      services (e.g., ConnectivityService) and netd than the current
      FrameworkListener / NativeDaemonConnector interface which uses
      text strings over a Unix socket.
      
      Bug: 27239233
      Change-Id: If40582ae2820e54f1960556b7bf7e88d98c525af
      24dcc8b1
  9. Feb 17, 2016
  10. Feb 13, 2016
    • Jeff Tinker's avatar
      Add mediadrm service · 0d5bac13
      Jeff Tinker authored
      Part of media security hardening
      
      This is an intermediate step toward moving
      mediadrm to a new service separate from mediaserver.
      This first step allows mediadrmservice to run based
      on the system property media.mediadrmservice.enable
      so it can be selectively enabled on devices that
      support using native_handles for secure buffers.
      
      bug: 22990512
      Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
      0d5bac13
  11. Feb 10, 2016
    • dcashman's avatar
      Make voiceinteractionservice app_api_service. · 8f5a891f
      dcashman authored
      Address the following denial from 3rd party voice interaction test:
      SELinux : avc:  denied  { find } for service=voiceinteraction pid=30281 uid=10139 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=0
      
      Bug: 27105570
      Change-Id: Ib87d364673cbc883df017bcda7fe1e854a76654f
      8f5a891f
  12. Feb 09, 2016
  13. Feb 05, 2016
  14. Jan 28, 2016
  15. Jan 27, 2016
  16. Jan 26, 2016
    • dcashman's avatar
      Reduce accessibility of voiceinteraction_service. · aedf2236
      dcashman authored
      The services under this label are not meant to be exposed to all apps.
      Currently only priv_app needs access.
      
      Bug: 26799206
      Change-Id: I07c60752d6ba78f27f90bf5075bcab47eba90b55
      aedf2236
    • Tao Bao's avatar
      Allow update_engine to use Binder IPC. · dce317cf
      Tao Bao authored
      Register service with servicemanager and name the context.
      
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      
      Also allow priv_app to communicate with update_engine.
      
      avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
      
      Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
      dce317cf
  17. Jan 22, 2016
  18. Dec 08, 2015
  19. Nov 19, 2015
    • Jeff Vander Stoep's avatar
      grant country_detector_service app_api_service attribute · 9d8728db
      Jeff Vander Stoep authored
      All apps should have access to the country_detector service.
      
      avc:  denied  { find } for service=country_detector pid=1802 uid=1010002 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:country_detector_service:s0 tclass=service_manager
      
      Bug: 25766732
      Change-Id: Ie3f1a801114030dada7ad70c715a62907a2d264f
      9d8728db
  20. Nov 18, 2015
    • Jeff Vander Stoep's avatar
      grant country_detector_service app_api_service attribute · 1e1d65a3
      Jeff Vander Stoep authored
      All apps should have access to the country_detector service.
      
      avc:  denied  { find } for service=country_detector pid=1802 uid=1010002 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:country_detector_service:s0 tclass=service_manager
      
      Bug: 25766732
      Change-Id: Ie3f1a801114030dada7ad70c715a62907a2d264f
      1e1d65a3
  21. Nov 17, 2015
    • Jeff Vander Stoep's avatar
      grant deviceidle_service app_api_service attribute · 692bdc44
      Jeff Vander Stoep authored
      avc:  denied  { find } for service=deviceidle pid=26116 uid=10007 scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:object_r:deviceidle_service:s0 tclass=service_manager
      
      Bug: 25734577
      Change-Id: I3c955e6df2186ad7adb6b599c5b6b802b8ecd8de
      692bdc44
  22. Oct 27, 2015
  23. Oct 22, 2015
  24. Oct 19, 2015
    • Jeff Vander Stoep's avatar
      Policy for priv_app domain · 7f09a945
      Jeff Vander Stoep authored
      Verifier needs access to apk files.
      avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0
      
      Give bluetooth_manager_service and trust_service the app_api_service
      attribute.
      avc:  denied  { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0
      avc:  denied  { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0
      
      Bug: 25066911
      Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
      7f09a945
  25. Oct 17, 2015
    • Jeff Vander Stoep's avatar
      Give services app_api_service attribute · 734e4d7c
      Jeff Vander Stoep authored
      avc:  denied  { find } for service=network_management pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager
      avc:  denied  { find } for service=netstats pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=0
      
      Bug: 25022496
      Change-Id: Ib6eac76b680fed3eca7e4942c6b0e375f12b6496
      734e4d7c
  26. Oct 16, 2015
    • Jeff Vander Stoep's avatar
      grant webviewupdate_service app_api_service attribute · 7813cc8d
      Jeff Vander Stoep authored
      avc:  denied  { find } for service=webviewupdate pid=11399 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:webviewupdate_service:s0 tclass=service_manager permissive=0
      
      Bug: 25018574
      Change-Id: I26a7846d1c80c1ab3842813f4148528030b1106a
      7813cc8d
  27. Sep 25, 2015
  28. May 20, 2015
  29. Apr 29, 2015
    • dcashman's avatar
      Make deviceidle accessible as system_api_service. · 31548db0
      dcashman authored
      deviceidle service should be accessible to all non third-party apps.
      
      Cherry-pick of commit: 7c1dced7
      
      Change-Id: Ia410fe0027f212009cc2abeaabc64c7c87841daa
      31548db0
    • dcashman's avatar
      Make deviceidle accessible as system_api_service. · 7c1dced7
      dcashman authored
      deviceidle service should be accessible to all non third-party apps.
      
      Change-Id: Ia410fe0027f212009cc2abeaabc64c7c87841daa
      7c1dced7
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · ab5cf668
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      (cherry picked from commit effcac7d)
      
      Bug: 20526234
      Change-Id: I450242cd085259b3f82f36f359ee65ff27bebd13
      ab5cf668
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · effcac7d
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      Bug: 20526234
      Change-Id: I3362ba07d1a7e5f1c47fe7e9ba6aec5ac3fec747
      effcac7d
  30. Apr 09, 2015
    • dcashman's avatar
      Make persistent_data_block_service a system_api_service. · 53212794
      dcashman authored
      Settings needs to be able to access it when opening developer options.
      
      Address the following denial:
      avc:  denied  { find } for service=persistent_data_block scontext=u:r:system_app:s0 tcontext=u:object_r:persistent_data_block_service:s0 tclass=service_manager
      
      Bug: 20131472
      Change-Id: I85e2334a92d5b8e23d0a75312c9b4b5bf6aadb0b
      53212794
    • dcashman's avatar
      Make backup service app_api_service. · 9378ceaf
      dcashman authored
      Backup service needs to be accessible to all apps to notify the system when
      something changes which is being backed-up.
      
      Bug: 18106000
      Change-Id: I8f34cca64299960fa45afc8d09110123eb79338b
      9378ceaf
    • dcashman's avatar
      Enforce more specific service access. · bd7f5803
      dcashman authored
      Move the remaining services from tmp_system_server_service to appropriate
      attributes and remove tmp_system_server and associated logging:
      
      registry
      restrictions
      rttmanager
      scheduling_policy
      search
      sensorservice
      serial
      servicediscovery
      statusbar
      task
      textservices
      telecom_service
      trust_service
      uimode
      updatelock
      usagestats
      usb
      user
      vibrator
      voiceinteraction
      wallpaper
      webviewupdate
      wifip2p
      wifi
      window
      
      Bug: 18106000
      Change-Id: Ia0a6d47099d82c53ba403af394537db6fbc71ca0
      bd7f5803
  31. Apr 08, 2015
    • dcashman's avatar
      Enforce more specific service access. · 03a6f64f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      network_management
      network_score
      notification
      package
      permission
      persistent
      power
      print
      processinfo
      procstats
      
      Bug: 18106000
      Change-Id: I9dfb41fa41cde72ef0059668410a2e9eb1af491c
      03a6f64f
  32. Apr 07, 2015
    • dcashman's avatar
      Enforce more specific service access. · 91b7c67d
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      jobscheduler
      launcherapps
      location
      lock_settings
      media_projection
      media_router
      media_session
      mount
      netpolicy
      netstats
      
      Bug: 18106000
      Change-Id: Ia82d475ec41f658851f945173c968f4abf57e7e1
      91b7c67d
    • dcashman's avatar
      Enforce more specific service access. · 3cc6fc5f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      diskstats
      display
      dreams
      dropbox
      ethernet
      fingerprint
      graphicstats
      hardware
      hdmi_control
      input_method
      input_service
      
      Bug: 18106000
      Change-Id: Iadd8aab9e78d9d39fb00cf0b5a95fa1927d02095
      3cc6fc5f
Loading