- 26 Aug, 2016 2 commits
-
-
Arve Hjønnevåg authored
This should be reverted when all system services have been cleaned up to not do this. A process looking up a service while running in the background will see the service registered by the active user (assuming the service is registered on every user switch), not the service registered by the user that the process itself belongs to. BUG: 30795333 Change-Id: I1b74d58be38ed358f43c163692f9e704f8f31dbe (cherry picked from commit e6bbe69b)
-
Arve Hjønnevåg authored
Prevent apps from registering services without relying on selinux checks. Bug: 29431260 Change-Id: I38c6e8bc7f7cba1cbd3568e8fed1ae7ac2054a9b (cherry picked from commit 2b74d2c1)
-
- 19 Feb, 2016 3 commits
-
-
Ian Pedowitz authored
This reverts commit b480269b. Change-Id: If405c0786c5bdd02e3f2c3356d56a4200c6b9dfb
-
Ian Pedowitz authored
This reverts commit d3b4c050. Change-Id: I961f89d4446ac23f0e267c6541b504c4ec6b3af1
-
Aurimas Liutikas authored
- Suppress unused parameter warnings. - Remove a few unused parameters. - Set the correct formatting for size_t log. Bug: 26936282 Change-Id: I2e2acb15d1bc05c6ba09563a87d5baceebe7ebd9
-
- 05 Oct, 2015 1 commit
-
-
William Roberts authored
The audit logs for servicemanager were missing the pid and uid of the source. This is useful for debugging. Before: ... SELinux : avc: denied { find } for service=android.security.keystore scontext=u:r:system_app:s0 ... After: ... SELinux : avc: denied { find } for service=android.security.keystore pid=1252 uid=1000 scontext=u:r:system_app:s0 ... Change-Id: Id1a6f38b99f11a31315439620ead2f01108b18b2 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- 03 Jun, 2015 2 commits
-
-
Stephen Smalley authored
The selinux_status_*() interfaces require calling selinux_status_open() first. Since this was not being called by servicemanager, the selinux_status_updated() call was always failing and servicemanager was not reloading service_contexts upon a policy reload. (cherrypicked from commit bea0746b ) Change-Id: I6ac62e114bbca99c5f0999feb918fcde15009274 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
The selinux_status_*() interfaces require calling selinux_status_open() first. Since this was not being called by servicemanager, the selinux_status_updated() call was always failing and servicemanager was not reloading service_contexts upon a policy reload. Change-Id: I6ac62e114bbca99c5f0999feb918fcde15009274 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- 04 Apr, 2015 1 commit
-
-
Elliott Hughes authored
Also use the 'ptr' union member rather than 'handle'. Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com> Change-Id: I68e5336cd3af3bc61dbddd2b33d7e1512c0c329c
-
- 01 Apr, 2015 1 commit
-
-
Mark Salyzyn authored
service_manager.c gets string.h inherited from private/android_filesystem_config.h it should not rely on this in the future. The intent is to move fs_config function into libcutils and thus deprecate any need for string.h in this include file. Bug: 19908228 Change-Id: Icc95ee02bf02c596463868b1330d209d1bd5c58a
-
- 05 Mar, 2015 1 commit
-
-
Nick Kralevich authored
Reorder the find permission checks. This avoids generating misleading SELinux denials when a service doesn't exist, or when a service is prohibited to isolated apps. The original reason for structuring the code this way is explained in https://android-review.googlesource.com/#/c/100530/4/cmds/servicemanager/service_manager.c@172 The concern at the time was to avoid leaking a situation where a caller could probe for the existance of a service. This turns out to be unnecessary. The same return value is used for both a permission denied and a service not found. The only side effect is the generation of an SELinux audit log, which likely won't be accessible to the calling application. Change-Id: I9760e1821ed16102fa5f9bec07f8c34944565be9
-
- 15 Jul, 2014 1 commit
-
-
Riley Spahn authored
Add SELinux MAC for the list and find functionality to service_manager. By default the list action uses the service_manager_type attribute as its target object. (cherry picked from commit c67e6307) Change-Id: Iaf14b21346822a6b544091a0f4a9949117934b9a
-
- 14 Jul, 2014 2 commits
-
-
Nick Kralevich authored
1) Pass length through to str8 function. 2) Fix implicit function definition warning. 3) Check for NULL from bio_get_string16 functions. Bug: 15886919 Bug: 15888753 (cherry picked from commit 7d42a3c3) Change-Id: I1f826b88826561ea126d811c087ba30623141511
-
Riley Spahn authored
Add SELinux MAC for the list and find functionality to service_manager. By default the list action uses the service_manager_type attribute as its target object. Change-Id: I7630f21a9f3232ae3d6d8b9a1119230b40899aef
-
- 12 Jul, 2014 1 commit
-
-
Nick Kralevich authored
1) Pass length through to str8 function. 2) Fix implicit function definition warning. 3) Check for NULL from bio_get_string16 functions. Bug: 15886919 Bug: 15888753 Change-Id: I78a401d55b84f382ab83911be32b8d501998aa82
-
- 26 Jun, 2014 1 commit
-
-
Riley Spahn authored
Remove the hardcoded tuples of UIDs and the services that each is allowed to register. We will rely only on permissions from SELinux. Change-Id: I1c44555a6e274814282398865b30ee938f40dabb
-
- 12 Jun, 2014 1 commit
-
-
Riley Spahn authored
Add a MAC check to the svc_can_register function in service_manager. The types are defined in external/sepolicy/service.te and the mapping from service names is defined in external/sepolicy/service_contexts. Currently uses the property context backend to parse the contexts file. Bug: 12909011 Change-Id: I5d90a614263c60571c7c70c2882e6fa929911ca5
-
- 11 Jun, 2014 1 commit
-
-
Wink Saville authored
Change-Id: Idb607c0aa32f80fe4fe1539aedea7a221e9e7f04
-
- 03 Jun, 2014 1 commit
-
-
Eric Laurent authored
Change-Id: I5d6fe1ecacca3a941317f841009322bafdf6adcd
-
- 28 May, 2014 1 commit
-
-
Santos Cordon authored
Change-Id: I9180797451dcb2e9029b20bed47f5d5cb8cddb9f (cherry picked from commit 3fb4de71)
-
- 22 May, 2014 1 commit
-
-
Santos Cordon authored
Change-Id: I9180797451dcb2e9029b20bed47f5d5cb8cddb9f
-
- 01 Feb, 2014 1 commit
-
-
Arve Hjønnevåg authored
Stop printing "invalid id " to stderr every time a process tries to connect to the servicemanager. Change-Id: Ib0e5a0375bfa2dec2c2f9cd668bd5dda46ed6588
-
- 31 Jan, 2014 5 commits
-
-
Serban Constantinescu authored
This patch adds support for binder transactions on 64bit systems without breaking the existing 32bit ABI. It has been tested on the Android emulator and ARMv8 Model. Most of the changes in this patch just follow the binder ABI. Change-Id: I8c37b847ea65008d56554d34d4696fe3d22f7533 Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com>
-
Serban Constantinescu authored
This patch corrects the types used for storing handles. Change-Id: If9c10782345f1de9e12b4b3fd6be9e02e6b568cd Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com>
-
Serban Constantinescu authored
This patch fixes some of the ServiceManager issues. The following patches of the series add fixes to the ABI. Change-Id: Ib479234c8704e12592f1b149ddec67881bc50230 Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com>
-
Serban Constantinescu authored
This patch extends the error handling. It also adds a check for a matching binder version - kernel/userspace. Change-Id: I43a262934b38c5711536aaa42754fed1ef04b39e Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com>
-
Serban Constantinescu authored
This patch switches ServiceManager to use the structures exported in the kernel headers rather then redefining its own. struct binder_txn is replaced with struct binder_transaction_data and struct binder_object with struct flat_binder_object, both defined in the binder driver header <linux/binder.h>. Change-Id: I3b3e97918173ea35a289e184774ae06193192da3 Signed-off-by:
Serban Constantinescu <serban.constantinescu@arm.com>
-
- 18 Sep, 2013 1 commit
-
-
Mike Lockwood authored
Change-Id: I8b6700c25ea2264fb3e1c16e18df281eb67b931f
-
- 11 Sep, 2013 1 commit
-
-
Mike Lockwood authored
Change-Id: Ia41f1edd05f233ac5ce43c34eb8ab3ab76ffa194
-
- 16 Jan, 2013 1 commit
-
-
Glenn Kasten authored
Change-Id: Ic17752fff30676fe692c80260ff68284543385dd
-
- 14 Nov, 2012 1 commit
-
-
Kenny Root authored
Change-Id: Ie15781de079e8ecc9616cab9a5e392f5c814d9d8
-
- 24 Oct, 2012 1 commit
-
-
Mike Lockwood authored
Change-Id: I0571813c1cfcf66abd36eb9f178fc49b618e88a6 Signed-off-by:
Mike Lockwood <lockwood@google.com>
-