Skip to content
Snippets Groups Projects
  1. Apr 29, 2015
    • Alex Klyubin's avatar
      Merge "Expand access to gatekeeperd." · 0bc92cea
      Alex Klyubin authored
      0bc92cea
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · effcac7d
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      Bug: 20526234
      Change-Id: I3362ba07d1a7e5f1c47fe7e9ba6aec5ac3fec747
      effcac7d
  2. Apr 28, 2015
  3. Apr 27, 2015
  4. Apr 25, 2015
  5. Apr 24, 2015
  6. Apr 20, 2015
  7. Apr 18, 2015
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
    • Jeff Sharkey's avatar
      Grant platform apps access to /mnt/media_rw. · c9036fb1
      Jeff Sharkey authored
      Raw physical storage devices are mounted by vold under /mnt/media_rw
      and then wrapped in a FUSE daemon that presents them under /storage.
      
      Normal apps only have access through /storage, but platform apps
      (such as ExternalStorageProvider) often bypass the FUSE daemon for
      performance reasons.
      
      avc: denied { search } for pid=6411 comm="Binder_1" name="media_rw" dev="tmpfs" ino=6666 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { write } for pid=3701 comm="Binder_2" name="PANO_20131016_162457.jpg" dev="sda1" ino=127 scontext=u:r:platform_app:s0:c522,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I66df236eade3ca25a10749dd43d173ff4628cfad
      c9036fb1
    • Nick Kralevich's avatar
      gatekeeperd: use more specific label for /data file · 367757d2
      Nick Kralevich authored
      Use a more specific label for /data/misc/gatekeeper
      
      Rearrange some other rules.
      
      Change-Id: Ib634e52526cf31a8f0a0e6d12bbf0f69dff8f6b5
      367757d2
  8. Apr 17, 2015
  9. Apr 16, 2015
  10. Apr 14, 2015
  11. Apr 13, 2015
  12. Apr 12, 2015
  13. Apr 11, 2015
  14. Apr 10, 2015
    • Jeff Sharkey's avatar
    • Nick Kralevich's avatar
      Revert "Exclude isolated_app from ptrace self." · 50d50621
      Nick Kralevich authored
      Google Breakpad (crash reporter for Chrome) relies on ptrace
      functionality. Without the ability to ptrace, the crash reporter
      tool is broken.
      
      Addresses the following denial:
      
        type=1400 audit(1428619926.939:1181): avc: denied { ptrace } for pid=10077 comm="CrRendererMain" scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:r:isolated_app:s0:c512,c768 tclass=process permissive=0
      
      This reverts commit e9623d8f.
      
      Bug: 20150694
      Bug: https://code.google.com/p/chromium/issues/detail?id=475270
      Change-Id: I1727c6a93f10ea6db877687a8f81ec789f9e501f
      50d50621
    • Nick Kralevich's avatar
    • Jeff Sharkey's avatar
      Allow installd to move around private app data. · 8da7876b
      Jeff Sharkey authored
      Add rules that allow installd to move private app data between
      internal and expanded storage devices.  For now we'll be reusing
      the "cp" binary using android_fork_execvp(), so grant access to
      devpts.
      
      avc: denied { read write } for name="14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      avc: denied { open } for path="/dev/pts/14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      
      avc: denied { read } for name="com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { open } for path="/data/data/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { create } for name="com.android.opengl.shaders_cache" scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      avc: denied { read write open } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/user/0/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="dm-0" ino=64518 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      
      Bug: 19993667
      Change-Id: I5188e660c8b5e97eab8f0c74147499ec688f3f19
      8da7876b
  15. Apr 09, 2015
    • Nick Kralevich's avatar
      isolated_app: Do not allow access to the gpu_device. · f1b5c665
      Nick Kralevich authored
      Bug: 17471434
      Bug: 18609318
      Change-Id: Idb3ed8ada03dbc07f35e74fd80cb989c8e6808bc
      f1b5c665
    • Nick Kralevich's avatar
      gatekeeperd: neverallow non-system_server binder call · 2234f9ff
      Nick Kralevich authored
      The current neverallow rule (compile time assertion)
      
        neverallow { domain -gatekeeperd -system_server } gatekeeper_service:service_manager find;
      
      asserts that no rule is present which allows processes other than
      system_server from asking servicemanager for a gatekeeperd token.
      
      However, if system_server leaks the token to other processes, it may
      be possible for those processes to access gatekeeperd directly, bypassing
      servicemanager.
      
      Add a neverallow rule to assert that no process other than system_server
      are allowed to make binder calls to gatekeeperd. Even if another process
      was to manage to get a binder token to gatekeeperd, it would be useless.
      
      Remove binder_service() from gatekeeperd. The original use of the
      binder_service() macro was to widely publish a binder service.
      If this macro is present and the calling process has a gatekeeperd
      binder token, it's implicitly possible for the following processes
      to make a binder call to gatekeeperd:
      
       * all app processes
       * dumpstate
       * system_server
       * mediaserver
       * surfaceflinger
      
      Removing binder_service revokes this implicit access.
      
      Add explicit access for system_server to make binder calls to
      gatekeeperd.
      
      Add explicit access for gatekeeperd to make calls to keystore.
      This was implicitly granted via binder_service() before, but now
      needs to be explicit.
      
      Change-Id: I23c1573d04ab670a42660d5922b39eecf4265b66
      2234f9ff
    • dcashman's avatar
    • dcashman's avatar
      Make persistent_data_block_service a system_api_service. · 53212794
      dcashman authored
      Settings needs to be able to access it when opening developer options.
      
      Address the following denial:
      avc:  denied  { find } for service=persistent_data_block scontext=u:r:system_app:s0 tcontext=u:object_r:persistent_data_block_service:s0 tclass=service_manager
      
      Bug: 20131472
      Change-Id: I85e2334a92d5b8e23d0a75312c9b4b5bf6aadb0b
      53212794
    • dcashman's avatar
      Merge "Make backup service app_api_service." · dd31d68f
      dcashman authored
      dd31d68f
Loading