- Mar 31, 2016
-
-
Daniel Rosenberg authored
-
Daniel Rosenberg authored
With sdcardfs, we no longer have a separate sdcardd acting as an intermediate between the outside world and /data/media. Unless we modify sdcardfs to change contexts, we need these. Remove this patch if sdcardfs is updated to change the secontext of fs accesses. Bug: 27925072 Change-Id: I3ad37c0f12836249c83042bdc1111b6360f22b3c
-
- Mar 30, 2016
-
-
Daniel Cashman authored
-
Jeff Vander Stoep authored
Bug: 27545805 Change-Id: I6281dd64c51f74b467deb7acd5cd4403696dcff2
-
dcashman authored
Bug: 21266225 Change-Id: I649c2ae36340d1f2b3db478e90e125c473b47b6e
-
- Mar 29, 2016
-
-
Daichi Hirono authored
To write bytes to appfuse file from priv_app, we need to specify mlstrustedobject. The CL fixes the following denial. type=1400 audit(0.0:77): avc: denied { write } for name="10" dev="fuse" ino=10 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:app_fuse_file:s0 tclass=file permissive=0 BUG=23093747 (cherry picked from commit 4d19f98c) Change-Id: I9901033bb3349d5def0bd7128db45a1169856dc1
-
- Mar 28, 2016
-
-
Calin Juravle authored
Similar to profman, dex2oat does more checks on profiles now. It needs to be able to do stat to test for existance and non-emptiness. 03-28 10:41:06.667 8611 8611 W dex2oat : type=1400 audit(0.0:129): avc: denied { getattr } for path="/data/misc/profiles/ref/com.google.android.apps.magazines/primary.prof" dev="dm-0" ino=636928 scontext=u:r:dex2oat:s0 tcontext=u:object_r:user_profile_data_file:s0 tclass=file permissive=0 Bug: 27860201 Change-Id: I3a7cb396596ae28a375ea98224ada29f093f475e
-
Calin Juravle authored
We do a bit more work checks in the runtime for the profiles and call stat on the files to see if they exists and their are not empty. SElinux error [ 297.842210] type=1400 audit(1459106986.097:7): avc: denied { getattr } for pid=4504 comm="profman" path="/data/misc/profiles/cur/0/com.google.android.youtube/primary.prof" dev="dm-1" ino=636936 scontext=u:r:profman:s0 tcontext=u:object_r:user_profile_data_file:s0:c512,c768 tclass=file permissive=0 Bug: 27860201 Change-Id: Ic97882e6057a4b5c3a16089b9b99b64bc1a3cd98
-
- Mar 25, 2016
-
-
Nick Kralevich authored
-
Mark Salyzyn authored
(cherry pick from commit 121f5bfd) 03-25 09:31:22.996 1 1 W init : type=1400 audit(0.0:8): \ avc: denied { getattr } for path="/data/misc/logd/logcat.052" \ dev="dm-2" ino=124778 scontext=u:r:init:s0 \ tcontext=u:object_r:misc_logd_file:s0 tclass=file permissive=0 . . . Introduced a new macro not_userdebug_nor_eng() Change-Id: I9c3a952c265cac096342493598fff7d41604ca45
-
Mark Salyzyn authored
(cherry pick from commit 4bf9a47e) Bug: 27176738 Change-Id: I70e4b7b54044dd541076eddd39a8e9f5d881badf
-
Nick Kralevich authored
There are now individual property files to control access to properties. Don't allow processes other than init to write to these property files. Change-Id: I184b9df4555ae5051f9a2ba946613c6c5d9d4403
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
(cherry picked from commit f2d07904) /dev/uio uio_device is already declared. Accessing uio through /sys is also common. Bug: 26990688 Change-Id: I3db941161dae31d3b87f265708abbcd9171a2c1f
-
Pierre Imai authored
-
- Mar 24, 2016
-
-
Mark Salyzyn authored
-
Mark Salyzyn authored
(cherry pick from commit 16fe52c9) One time executables. recovery_refresh can be used at any time to ensure recovery logs in pmsg are re-placed at the end of the FIFO. recovery_persist takes the recovery logs in pmsg and drops them into /data/misc/recovery/ directory. Bug: 27176738 Change-Id: Ife3cf323930fb7a6a5d1704667961f9d42bfc5ac
-
dcashman authored
sysfs_thermal nodes are common enough to warrant an entry in global policy and the new HardwarePropertiesManagerService exists explicitly to expose some of this information. Address the following denials: avc: denied { search } for name="thermal" dev="sysfs" ino=17509 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=1 avc: denied { read } for name="temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 Bug: 27809332 Change-Id: I2dbc737971bf37d197adf0d5ff07cb611199300d
-
Pierre Imai authored
Change-Id: I0c0bce9cd50a25897f5c4521ee9b4fada6648a59
-
- Mar 22, 2016
-
-
Nick Kralevich authored
See https://groups.google.com/d/msg/android-ndk/BbEOA9pnR-I/HgLkGy5qAgAJ Addresses the following denial: avc: denied { lock } for path="/data/data/com.mypackage/files/somefilename" dev="mmcblk0p28" ino=114736 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 While I'm here, also add lock to w_file_perms. Change-Id: I2568a228099c4e112e4a8b80da3bfcf2e35eb0ea
-
Vladislav Kuzkokov authored
-
Vladislav Kuzkokov authored
Access to modifying methods of ProxyService is checked in implementation. Bug: 27337770 Change-Id: I718ea8f4fd6be940ee9ef57f0571d884a013489b
-
Daniel Rosenberg authored
-
- Mar 19, 2016
-
-
Felipe Leme authored
Cherry picked from 610f461e (AOSP). BUG: 27419521 Change-Id: I63108468d75be3ef7f9761107a3df8997f207d07
-
- Mar 16, 2016
-
-
Nick Kralevich authored
The changes to ptrace in https://android-review.googlesource.com/#/c/175786/ (removing it from app.te and only adding it to isolated_app and untrusted_app) broke WebView crash handling in cases where privileged apps (like gmscore) use WebView. The only way to fix this would be to allow priv_app to self-ptrace as well. :/ Bug: 27697529 Change-Id: Ib9a3810dddc9f4213b6260133cbae23f669ae8dc
-
- Mar 15, 2016
-
-
Peng Xu authored
SELinux label is created for contexthub_service system service. ContextHub service manages all available context hubs and serves fulfil communication between apps and underlying context hub hardware. Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
-
- Mar 14, 2016
-
-
dcashman authored
Applications do not explicitly request handles to the batteryproperties service, but the BatteryManager obtains a reference to it and uses it for its underlying property queries. Mark it as an app_api_service so that all applications may use this API. Also remove the batterypropreg service label, as this does not appear to be used and may have been a duplication of batteryproperties. As a result, remove the healthd_service type and replace it with a more specific batteryproperties_service type. (cherry-picked from commit: 9ed71eff) Bug: 27442760 Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
-
Polina Bondarenko authored
-
Daniel Cashman authored
-
- Mar 11, 2016
-
-
dcashman authored
HwRngTest needs access to the hwrandom sysfs files, but untrused_app does not have access to sysfs. Give these files their own label and allow the needed read access. Bug: 27263241 Change-Id: I718ba485e9e6627bac6e579f746658d85134b24b
-
- Mar 10, 2016
-
-
Daniel Cashman authored
-
Josh Gao authored
-
Nick Kralevich authored
Remove permissions which are already covered by other permissions. Found by running: sepolicy-analyze path/to/sepolicy dups No functional change. Change-Id: I526d1c1111df718b29e8276b024fa0788ad17c71
-
dcashman authored
Many permissions were removed from untrusted_app by the removal of domain_deprecated, including procfs access. procfs file access was restored, however, but not completely. Add the ability to getattr to all domains, so that other domains which lost domain_deprecated may benefit, as they will likely need it. Bug: 27249037 Change-Id: Id3f5e6121548b29d739d5e0fa6ccdbc9f0fc29be
-
Josh Gao authored
Bug: http://b/27367422 Change-Id: I936c16281e06214b35f8d245da8f619dc92ff15f (cherry picked from commit 48141c36)
-
Oleksandr Peletskyi authored
BUG: 27583869 Change-Id: I0a25bd03f3998d48dba355b91140611e38ce7b0d
-
- Mar 09, 2016
-
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for service=media.drm pid=6030 uid=10012 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:mediadrmserver_service:s0 tclass=service_manager Bug: 27553530 Change-Id: I060de7ee1f66c7a545076b7de8363bebaac61f2c
-
Makoto Onuki authored
-
Polina Bondarenko authored
Bug: 27531271 Change-Id: I3c5eee86d09696373ab155f93ba6c85da224cb51
-