Skip to content
Snippets Groups Projects
  1. May 01, 2015
    • Stephen Smalley's avatar
      Ensure that domain and appdomain attributes are assigned. · 4a12d963
      Stephen Smalley authored
      
      Prevent defining any process types without the domain attribute
      so that all allow and neverallow rules written on domain are
      applied to all processes.
      
      Prevent defining any app process types without the appdomain
      attribute so that all allow and neverallow rules written on
      appdomain are applied to all app processes.
      
      Change-Id: I4cb565314fd40e1e82c4360efb671b175a1ee389
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      4a12d963
  2. Apr 30, 2015
    • Jeff Sharkey's avatar
      Allow installd to move APKs. · 8f821db7
      Jeff Sharkey authored
      As an optimization, installd is now moving previously-installed
      applications between attached storage volumes.  This is effectively
      copying to the new location, then deleting the old location.
      
      Since OAT files can now live under /data/app directories, we also
      need the ability to relabel those files.
      
      avc: denied { create } for name="base.apk" scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { write } for path="/data/app/com.example.playground-2/base.apk" dev="mmcblk0p16" ino=40570 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { setattr } for name="base.apk" dev="mmcblk0p16" ino=40570 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { relabelfrom } for name="base.odex" dev="mmcblk0p16" ino=40574 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { relabelto } for name="base.odex" dev="mmcblk0p16" ino=40574 scontext=u:r:installd:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1
      
      Bug: 19993667, 20275578
      Change-Id: I52bb29ed9f57b3216657eb757d78b06eeaf53458
      8f821db7
  3. Apr 29, 2015
  4. Apr 28, 2015
  5. Apr 27, 2015
  6. Apr 25, 2015
  7. Apr 24, 2015
  8. Apr 20, 2015
  9. Apr 18, 2015
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
    • Jeff Sharkey's avatar
      Grant platform apps access to /mnt/media_rw. · c9036fb1
      Jeff Sharkey authored
      Raw physical storage devices are mounted by vold under /mnt/media_rw
      and then wrapped in a FUSE daemon that presents them under /storage.
      
      Normal apps only have access through /storage, but platform apps
      (such as ExternalStorageProvider) often bypass the FUSE daemon for
      performance reasons.
      
      avc: denied { search } for pid=6411 comm="Binder_1" name="media_rw" dev="tmpfs" ino=6666 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { write } for pid=3701 comm="Binder_2" name="PANO_20131016_162457.jpg" dev="sda1" ino=127 scontext=u:r:platform_app:s0:c522,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I66df236eade3ca25a10749dd43d173ff4628cfad
      c9036fb1
    • Nick Kralevich's avatar
      gatekeeperd: use more specific label for /data file · 367757d2
      Nick Kralevich authored
      Use a more specific label for /data/misc/gatekeeper
      
      Rearrange some other rules.
      
      Change-Id: Ib634e52526cf31a8f0a0e6d12bbf0f69dff8f6b5
      367757d2
  10. Apr 17, 2015
  11. Apr 16, 2015
  12. Apr 14, 2015
  13. Apr 13, 2015
  14. Apr 12, 2015
  15. Apr 11, 2015
  16. Apr 10, 2015
    • Jeff Sharkey's avatar
    • Nick Kralevich's avatar
      Revert "Exclude isolated_app from ptrace self." · 50d50621
      Nick Kralevich authored
      Google Breakpad (crash reporter for Chrome) relies on ptrace
      functionality. Without the ability to ptrace, the crash reporter
      tool is broken.
      
      Addresses the following denial:
      
        type=1400 audit(1428619926.939:1181): avc: denied { ptrace } for pid=10077 comm="CrRendererMain" scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:r:isolated_app:s0:c512,c768 tclass=process permissive=0
      
      This reverts commit e9623d8f.
      
      Bug: 20150694
      Bug: https://code.google.com/p/chromium/issues/detail?id=475270
      Change-Id: I1727c6a93f10ea6db877687a8f81ec789f9e501f
      50d50621
    • Nick Kralevich's avatar
    • Jeff Sharkey's avatar
      Allow installd to move around private app data. · 8da7876b
      Jeff Sharkey authored
      Add rules that allow installd to move private app data between
      internal and expanded storage devices.  For now we'll be reusing
      the "cp" binary using android_fork_execvp(), so grant access to
      devpts.
      
      avc: denied { read write } for name="14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      avc: denied { open } for path="/dev/pts/14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      
      avc: denied { read } for name="com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { open } for path="/data/data/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { create } for name="com.android.opengl.shaders_cache" scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      avc: denied { read write open } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/user/0/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="dm-0" ino=64518 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      
      Bug: 19993667
      Change-Id: I5188e660c8b5e97eab8f0c74147499ec688f3f19
      8da7876b
  17. Apr 09, 2015
Loading