Skip to content
Snippets Groups Projects
  1. May 07, 2015
    • William Roberts's avatar
      Replace unix_socket_connect() and explicit property sets with macro · 625a3526
      William Roberts authored
      
      A common source of mistakes when authoring sepolicy is properly
      setting up property sets. This is a 3 part step of:
      1. Allowing the unix domain connection to the init/property service
      2. Allowing write on the property_socket file
      3. Allowing the set on class property_service
      
      The macro unix_socket_connect() handled 1 and 2, but could be
      confusing for first time policy authors. 3 had to be explicitly
      added.
      
      To correct this, we introduce a new macros:
      set_prop(sourcedomain, targetprop)
      
      This macro handles steps 1, 2 and 3.
      
      No difference in sediff is expected.
      
      Change-Id: I630ba0178439c935d08062892990d43a3cc1239e
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@linux.intel.com>
      625a3526
  2. May 05, 2015
  3. May 04, 2015
    • dcashman's avatar
      Allow system_app to list all services. · 6780dfee
      dcashman authored
      The Settings app contains a SystemPropPoker class which notifies every service
      on the system that a property has changed.
      
      Address the following denial:
      avc:  denied  { list } for service=NULL scontext=u:r:system_app:s0 tcontext=u:r:servicemanager:s0 tclass=service_manager
      
      Bug: 20762975
      Change-Id: I81926e8833c1abcb17a4d49687fc89619b416d6c
      6780dfee
    • Than McIntosh's avatar
      New sepolicy for perfprofd, simpleperf. · 0fdd364e
      Than McIntosh authored
      Bug: http://b/19483574
      
      Change-Id: I594f04004cccd2cbfadbd0f9d1bbb9815a2ea59d
      0fdd364e
  4. May 01, 2015
    • Stephen Smalley's avatar
      Ensure that domain and appdomain attributes are assigned. · 4a12d963
      Stephen Smalley authored
      
      Prevent defining any process types without the domain attribute
      so that all allow and neverallow rules written on domain are
      applied to all processes.
      
      Prevent defining any app process types without the appdomain
      attribute so that all allow and neverallow rules written on
      appdomain are applied to all app processes.
      
      Change-Id: I4cb565314fd40e1e82c4360efb671b175a1ee389
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      4a12d963
  5. Apr 30, 2015
    • Jeff Sharkey's avatar
      Allow installd to move APKs. · 8f821db7
      Jeff Sharkey authored
      As an optimization, installd is now moving previously-installed
      applications between attached storage volumes.  This is effectively
      copying to the new location, then deleting the old location.
      
      Since OAT files can now live under /data/app directories, we also
      need the ability to relabel those files.
      
      avc: denied { create } for name="base.apk" scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { write } for path="/data/app/com.example.playground-2/base.apk" dev="mmcblk0p16" ino=40570 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { setattr } for name="base.apk" dev="mmcblk0p16" ino=40570 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { relabelfrom } for name="base.odex" dev="mmcblk0p16" ino=40574 scontext=u:r:installd:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=1
      avc: denied { relabelto } for name="base.odex" dev="mmcblk0p16" ino=40574 scontext=u:r:installd:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1
      
      Bug: 19993667, 20275578
      Change-Id: I52bb29ed9f57b3216657eb757d78b06eeaf53458
      8f821db7
  6. Apr 29, 2015
  7. Apr 28, 2015
  8. Apr 27, 2015
  9. Apr 25, 2015
  10. Apr 24, 2015
  11. Apr 20, 2015
  12. Apr 18, 2015
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
    • Jeff Sharkey's avatar
      Grant platform apps access to /mnt/media_rw. · c9036fb1
      Jeff Sharkey authored
      Raw physical storage devices are mounted by vold under /mnt/media_rw
      and then wrapped in a FUSE daemon that presents them under /storage.
      
      Normal apps only have access through /storage, but platform apps
      (such as ExternalStorageProvider) often bypass the FUSE daemon for
      performance reasons.
      
      avc: denied { search } for pid=6411 comm="Binder_1" name="media_rw" dev="tmpfs" ino=6666 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { write } for pid=3701 comm="Binder_2" name="PANO_20131016_162457.jpg" dev="sda1" ino=127 scontext=u:r:platform_app:s0:c522,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I66df236eade3ca25a10749dd43d173ff4628cfad
      c9036fb1
    • Nick Kralevich's avatar
      gatekeeperd: use more specific label for /data file · 367757d2
      Nick Kralevich authored
      Use a more specific label for /data/misc/gatekeeper
      
      Rearrange some other rules.
      
      Change-Id: Ib634e52526cf31a8f0a0e6d12bbf0f69dff8f6b5
      367757d2
  13. Apr 17, 2015
  14. Apr 16, 2015
  15. Apr 14, 2015
  16. Apr 13, 2015
  17. Apr 12, 2015
  18. Apr 11, 2015
  19. Apr 10, 2015
Loading