Skip to content
Snippets Groups Projects
  1. Sep 13, 2014
    • Christopher Ferris's avatar
      Allow dumpstate to read /system/bin executables. · 04f3d790
      Christopher Ferris authored
      On 64 bit systems, it's necessary to read the /system/bin executables
      elf header to determine if it's a 32 bit or 64 bit executable to
      contact the correct debuggerd service.
      
      Bug: 17487122
      Change-Id: Ica78aa54e5abbb051924166c6808b79b516274fe
      04f3d790
  2. Sep 09, 2014
    • dcashman's avatar
    • dcashman's avatar
      Enable selinux read_policy for adb pull. · 309cc668
      dcashman authored
      Remove permission from appdomain.
      
      Bug: 16866291
      
      Change-Id: I37936fed33c337e1ab2816258c2aff52700af116
      309cc668
    • Nick Kralevich's avatar
      Allow kernel thread to read app data files · b0a99513
      Nick Kralevich authored
      When vold mounts an OBB on behalf of another application, the kernel
      spins up the "loop0" thread to perform the mount operation. Grant
      the kernel thread the ability to read app data files, so the mount
      operation can succeed.
      
      Steps to reproduce:
      
        1) Run: runtest --path cts/tests/tests/os/src/android/os/storage/cts/StorageManagerTest.java
      
      Expected:
      
        1) All tests pass
      
      Actual:
      
        Test failure, with the following error message:
      
        loop0   : type=1400 audit(0.0:46): avc: denied { read } for path="/data/data/com.android.cts.stub/files/test1.obb" dev="mmcblk0p16" ino=115465 scontext=u:r:kernel:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=0
        Vold    : Image mount failed (I/O error)
        MountService: Couldn't mount OBB file: -1
        StorageManager: Received message.  path=/data/data/com.android.cts.stub/files/test1.obb, state=21
        TestRunner: failed: testMountAndUnmountObbNormal(android.os.storage.cts.StorageManagerTest)
        TestRunner: ----- begin exception -----
        TestRunner: junit.framework.AssertionFailedError: OBB should be mounted
        TestRunner:    at junit.framework.Assert.fail(Assert.java:50)
        TestRunner:    at junit.framework.Assert.assertTrue(Assert.java:20)
        TestRunner:    at android.os.storage.cts.StorageManagerTest.mountObb(StorageManagerTest.java:235)
      
      Bug: 17428116
      Change-Id: Id1a39a809b6c3942ff7e08884b40e3e4eec73b6a
      b0a99513
  3. Sep 08, 2014
    • dcashman's avatar
      Add support for factory reset protection. · 47bd7300
      dcashman authored
      Address the following denials:
      <12>[  417.732129] type=1400 audit(365340.189:47): avc: denied { read } for pid=1737 comm="Binder_2" name="mmcblk0p18" dev="tmpfs" ino=12406 scontext=u:r:system_server:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
      <12>[  417.882126] type=1400 audit(365340.339:48): avc: denied { read } for pid=1737 comm="Binder_2" name="mmcblk0p18" dev="tmpfs" ino=12406 scontext=u:r:system_server:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
      
      Bug: 16710840
      Change-Id: I8cb5b4b17dffe14f0bf05d63eb8f6ab8d5c09f53
      47bd7300
  4. Sep 04, 2014
    • Nick Kralevich's avatar
      sdcardd: grant unmount · abfd427a
      Nick Kralevich authored
      If the sdcard daemon is restarted (crash or otherwise), one of the first
      things it attempts to do is umount the previously mounted /mnt/shell/emulated
      fuse filesystem, which is denied by SELinux with the following denial:
      
        sdcard  : type=1400 audit(0.0:6997): avc: denied { unmount } for scontext=u:r:sdcardd:s0 tcontext=u:object_r:fuse:s0 tclass=filesystem permissive=0
      
      Allow the operation.
      
      Steps to reproduce:
      
        1) adb shell into the device and su to root
        2) run "kill -9 [PID OF SDCARD]
      
      Expected:
      
        sdcard daemon successfully restarts without error message.
      
      Actual:
      
        SELinux denial above, plus attempts to mount a new filesystem
        on top of the existing filesystem.
      
      Bug: 17383009
      Change-Id: I386bfc98e2b5b32b1d11408f7cfbd6e3c1af68f4
      abfd427a
  5. Sep 01, 2014
    • Mark Salyzyn's avatar
      logd: permit app access to clear logs · bcdff890
      Mark Salyzyn authored
      I/auditd(19949): type=1400 audit(0.0:71): avc:  denied  { write } for  comm="logcat" name="logd" dev="tmpfs" ino=5924 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:logd_socket:s0 tclass=sock_file
      
      (cherry picked from 60f0be84)
      
      Bug: 17323719
      Change-Id: Id8399195196ffad884eef98030d544c68ed0596f
      bcdff890
  6. Aug 29, 2014
  7. Aug 27, 2014
    • dcashman's avatar
    • dcashman's avatar
      Add permissive domains check to sepolicy-analyze. · c30dd63f
      dcashman authored
      Also enable global reading of kernel policy file. Motivation for this is to
      allow read access to the kernel version of the binary selinux policy.
      
      Bug: 17288791
      
      Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
      c30dd63f
    • Nick Kralevich's avatar
      support kernel writes to external SDcards · 28b26bcf
      Nick Kralevich authored
      The kernel, when it creates a loop block device, starts a new
      kernel thread "loop0" (drivers/block/loop.c). This kernel thread,
      which performs writes on behalf of other processes, needs read/write
      privileges to the sdcard. Allow it.
      
      Steps to reproduce:
      0) Get device with external, removable sdcard
      1) Run: "adb install -s foo.apk"
      
      Expected:
      
        APK installs successfully.
      
      Actual:
      
        APK fails to install. Error message:
      
          Vold  E  Failed to write superblock (I/O error)
          loop0  W  type=1400 audit(0.0:3123): avc: denied { read } for path="/mnt/secure/asec/smdl1645334795.tmp.asec" dev="mmcblk1p1" ino=528 scontext=u:r:kernel:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=0
          PackageHelper  E  Failed to create secure container smdl1645334795.tmp
          DefContainer  E  Failed to create container smdl1645334795.tmp
      
      Bug: 17158723
      
      (cherry picked from commit 4c6b1350)
      
      Change-Id: Iea727ac7958fc31d85a037ac79badbe9c85693bd
      28b26bcf
    • dcashman's avatar
      Allow appdomain read perms on apk_data_files. · 711895db
      dcashman authored
      Address:
      type=1400 audit(0.0:103): avc: denied { read } for name="arm" dev="mmcblk0p28" ino=195471 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:apk_data_file:s0 tclass=dir
      
      Bug: 16204150
      Change-Id: I8bf0172b26b780c110c0d95c691785143acd7dd2
      711895db
  8. Aug 19, 2014
    • dcashman's avatar
      DO NOT MERGE. Allow debuggerd read access to shared_relro files. · 85f255b8
      dcashman authored
      Addresses the following denial when debuggerd attempts to stat Webview mmap'd
      shared relro files on process crash.  Full read permissions may not be necessary:
      
      W/debuggerd(  185): type=1400 audit(0.0:97): avc: denied { search } for name="shared_relro" dev="mmcblk0p28" ino=618955 scontext=u:r:debuggerd:s0 tcontext=u:object_r:shared_relro_file:s0 tclass=dir
      
      Bug: 17101854
      Change-Id: I11eea85668ba033c554e5aab99b70a454fb75164
      85f255b8
  9. Aug 15, 2014
  10. Aug 06, 2014
  11. Aug 07, 2014
    • dcashman's avatar
      DO NOT MERGE. Allow untrusted_app access to temporary apk files. · 1c1eb869
      dcashman authored
      Before actual installation, apks are put in a staging area where they are
      scanned by a verifier before completing the install flow.  This verifier runs as
      a priv-app, which is in the untrusted_app domain.  Allow untrusted_app
      read-access to these files.
      
      Bug: 16515815
      
      Change-Id: Ifedc12a33b1f53b62f45013e7b253dbc79b02a4e
      1c1eb869
  12. Aug 06, 2014
  13. Jul 30, 2014
    • Stephen Smalley's avatar
      Fix neverallow rules to eliminate CTS SELinuxTest warnings. · d990a78f
      Stephen Smalley authored
      
      Fix two neverallow rules that yield Invalid SELinux context
      warnings from the CTS SELinuxTest.
      
      For transitions from app domains, we only need to check
      { domain -appdomain } (i.e. domains other than app domains),
      not ~appdomain (i.e. all types other than app domains).  Otherwise
      SELinuxTest tries to generate contexts with the r role and
      non-domain types for testing since the target class is process,
      and such contexts are invalid.
      
      For keeping file_type and fs_type exclusive, we only need to
      check associate permission, not all filesystem permissions, as
      only associate takes a file type as the source context.  Otherwise
      SELinuxTest tries to generate contexts with the r role and
      non-domain types for testing filesystem permissions other than
      associate, since the source of such checks is normally a process
      context.
      
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      
      (cherry picked from commit 21ada26d)
      
      Change-Id: I3346584da9b89f352864dcc30dde06d6bf42e98e
      d990a78f
  14. Jul 29, 2014
  15. Jul 28, 2014
  16. Jul 25, 2014
    • Narayan Kamath's avatar
      Revert "fix system_server dex2oat exec" · aa8e657e
      Narayan Kamath authored
      This reverts commit 10370f5f.
      
      The underlying issue has been fixed and the system_server
      will now go via installd to get stuff compiled, if required.
      
      bug: 16317188
      
      Change-Id: I77a07748a39341f7082fb9fc9792c4139c90516d
      aa8e657e
    • Nick Kralevich's avatar
      Allow sdcardd to read /data/.layout_version · 792d8650
      Nick Kralevich authored
      As described in the system/core commit with the same Change-Id,
      there's a race condition between installd and sdcard when it
      comes to accessing /data/media. Resolve the race by checking
      /data/.layout_version to make sure the filesystem has been upgraded.
      
      Maybe indirectly fixes the following SELinux denial:
      
        sdcard  : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      
      Bug: 16329437
      Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
      792d8650
  17. Jul 24, 2014
  18. Jul 22, 2014
  19. Jul 18, 2014
  20. Jul 21, 2014
  21. Jul 18, 2014
  22. Jul 17, 2014
  23. Jul 16, 2014
    • Michael Wright's avatar
      Add MediaProjectionManagerService to service list DO NOT MERGE · 0ccfd5da
      Michael Wright authored
      Change-Id: I66a88b5dafc295e6daa9f4c0225aa593c97fe187
      0ccfd5da
    • Nick Kralevich's avatar
      dex2oat: fix forward-locked upgrades with unlabeled asecs · e4aa75db
      Nick Kralevich authored
      dex2oat fails when upgrading unlabeled asec containers.
      
      Steps to reproduce:
      
      1) Install a forward locked app on Android 4.1
        adb install -l foo.apk
      2) Upgrade to tip-of-tree
      
      Addresses the following denial:
      
        <4>[  379.886665] type=1400 audit(1405549869.210:4): avc: denied { read } for pid=2389 comm="dex2oat" path="/mnt/asec/jackpal.androidterm-1/pkg.apk" dev=dm-0 ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      (cherry picked from commit 270be6e8)
      
      Change-Id: I58dc6ebe61a5b5840434077a55f1afbeed602137
      e4aa75db
    • Nick Kralevich's avatar
      lmkd: allow lmkd to lock itself in memory · 555c3c5a
      Nick Kralevich authored
      addresses the following denial:
      
        type=1400 audit(1.871:3): avc:  denied  { ipc_lock } for  pid=1406 comm="lmkd" capability=14  scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability
      
      Bug: 16236289
      
      (cherry picked from commit 6a1405d7)
      
      Change-Id: I560f1e52eac9360d10d81fc8a9f60eba907a8466
      555c3c5a
Loading