Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

file_contexts

  • Stephen Smalley's avatar
    19c50903
    Define a type for /data/dalvik-cache/profiles. · 19c50903
    Stephen Smalley authored
    
    I9b8e59e3bd7df8a1bf60fa7ffd376a24ba0eb42f added a profiles
    subdirectory to /data/dalvik-cache with files that must be
    app-writable.  As a result, we have denials such as:
    W/Profiler( 3328): type=1400 audit(0.0:199): avc:  denied  { write } for  name="com.google.android.setupwizard" dev="mmcblk0p28" ino=106067 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file
    W/Profiler( 3328): type=1300 audit(0.0:199): arch=40000028 syscall=322 per=800000 success=yes exit=33 a0=ffffff9c a1=b8362708 a2=20002 a3=0 items=1 ppid=194 auid=4294967295 uid=10019 gid=10019 euid=10019 suid=10019 fsuid=10019 egid=10019 sgid=10019 fsgid=10019 tty=(none) ses=4294967295 exe="/system/bin/app_process" subj=u:r:untrusted_app:s0 key=(null)
    W/auditd  (  286): type=1307 audit(0.0:199):  cwd="/"
    W/auditd  (  286): type=1302 audit(0.0:199): item=0 name="/data/dalvik-cache/profiles/com.google.android.setupwizard" inode=106067 dev=b3:1c mode=0100664 ouid=1012 ogid=50019 rdev=00:00 obj=u:object_r:dalvikcache_data_file:s0
    
    We do not want to allow untrusted app domains to write to the
    existing type on other /data/dalvik-cache files as that could be used
    for code injection into another app domain, the zygote or the system_server.
    So define a new type for this subdirectory.  The restorecon_recursive /data
    in init.rc will fix the labeling on devices that already have a profiles
    directory created.  For correct labeling on first creation, we also need
    a separate change to installd under the same change id.
    
    Bug: 13927667
    Change-Id: I4857d031f9e7e60d48b8c72fcb22a81b3a2ebaaa
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    19c50903
    History
    Define a type for /data/dalvik-cache/profiles.
    Stephen Smalley authored
    
    I9b8e59e3bd7df8a1bf60fa7ffd376a24ba0eb42f added a profiles
    subdirectory to /data/dalvik-cache with files that must be
    app-writable.  As a result, we have denials such as:
    W/Profiler( 3328): type=1400 audit(0.0:199): avc:  denied  { write } for  name="com.google.android.setupwizard" dev="mmcblk0p28" ino=106067 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file
    W/Profiler( 3328): type=1300 audit(0.0:199): arch=40000028 syscall=322 per=800000 success=yes exit=33 a0=ffffff9c a1=b8362708 a2=20002 a3=0 items=1 ppid=194 auid=4294967295 uid=10019 gid=10019 euid=10019 suid=10019 fsuid=10019 egid=10019 sgid=10019 fsgid=10019 tty=(none) ses=4294967295 exe="/system/bin/app_process" subj=u:r:untrusted_app:s0 key=(null)
    W/auditd  (  286): type=1307 audit(0.0:199):  cwd="/"
    W/auditd  (  286): type=1302 audit(0.0:199): item=0 name="/data/dalvik-cache/profiles/com.google.android.setupwizard" inode=106067 dev=b3:1c mode=0100664 ouid=1012 ogid=50019 rdev=00:00 obj=u:object_r:dalvikcache_data_file:s0
    
    We do not want to allow untrusted app domains to write to the
    existing type on other /data/dalvik-cache files as that could be used
    for code injection into another app domain, the zygote or the system_server.
    So define a new type for this subdirectory.  The restorecon_recursive /data
    in init.rc will fix the labeling on devices that already have a profiles
    directory created.  For correct labeling on first creation, we also need
    a separate change to installd under the same change id.
    
    Bug: 13927667
    Change-Id: I4857d031f9e7e60d48b8c72fcb22a81b3a2ebaaa
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>