- Mar 10, 2016
-
-
dcashman authored
Many permissions were removed from untrusted_app by the removal of domain_deprecated, including procfs access. procfs file access was restored, however, but not completely. Add the ability to getattr to all domains, so that other domains which lost domain_deprecated may benefit, as they will likely need it. Bug: 27249037 Change-Id: Id3f5e6121548b29d739d5e0fa6ccdbc9f0fc29be
-
- Mar 09, 2016
-
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for service=media.drm pid=6030 uid=10012 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:mediadrmserver_service:s0 tclass=service_manager Bug: 27553530 Change-Id: I060de7ee1f66c7a545076b7de8363bebaac61f2c
-
Makoto Onuki authored
-
Torne (Richard Coles) authored
It's okay for isolated apps to connect to the webview update service to find out which APK is WebView. This enables isolated renderer processes to load their code from the WebView APK. Change-Id: Ia287280a994dbd852b4f630da5548e7b6cf4e08f
-
Makoto Onuki authored
... and client apps to read them. A full path looks like this: /data/system_ce/[user-id]/shortcut_service/bitmaps/[creator-app-package]/[timestamp].png System server will: - Create/delete the directories. - Write/remove PNG files in them. - Open the PNG files and return file descriptors to client apps Client apps will: - Receive file descriptors and read from them. Bug 27548047 Change-Id: I3d9ac6ab0c92b2953b84c3c5aabe1f653e6bea6b
-
- Mar 08, 2016
-
-
Calin Juravle authored
-
- Mar 07, 2016
-
-
Calin Juravle authored
Vold needs to be able to query if the directory exists and eventually to fix permissions and the owner. Typical error: W vold : type=1400 audit(0.0:485): avc: denied { getattr } for path="/data/misc/profiles/cur/11/foreign-dex" dev="dm-2" ino=343857 scontext=u:r:vold:s0 tcontext=u:object_r:user_profile_foreign_dex_data_file:s0 tclass=dir permissive=0 Bug: 27517932 Change-Id: Iff10c864634baa97cc814916ee7495b262e0c7eb
-
Makoto Onuki authored
-
dcashman authored
Bug: 27511071 Change-Id: I99ea21638a4df8ad1f815d91bb970e1f8f143030
-
Ruben Brunk authored
-
Ruben Brunk authored
- Required to query cpusets information. Bug: 22855417 Bug: 27381794 Bug: 27498731 Change-Id: I6d192aad2135d99a6c9cdaf97696b0822bd21897
-
Nick Kralevich authored
Bug: 27511071 Change-Id: I737aa9daac6c78846fe375300c3338e401d733ac
-
Nick Kralevich authored
It's unlikely we'll get /proc locked down for the N release, so delete the auditallow to avoid spamming the logs. Mark this commit as DO NOT MERGE so we can continue to make progress on this for future Android releases. Change-Id: Ibf27bc5cb1b23c21e123aae8a4f190560d0ac2dc
-
- Mar 06, 2016
-
-
Jeff Sharkey authored
-
- Mar 05, 2016
-
-
Jeff Sharkey authored
Both appdomain and priv_app can set the default ringtones, so the cache files need to be mlstrustedobject. avc: denied { write } for path="/data/system_de/0/ringtones/ringtone_cache" dev="mmcblk0p44" ino=1602501 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0 Bug: 27366059 Change-Id: Ib362f58b180a62bd46800083d6c538426f955b10
-
- Mar 04, 2016
-
-
Alex Deymo authored
When using the A/B updater, a device specific hook is sometimes needed to run after the new partitions are updated but before rebooting into the new image. This hook is referred to throughout the code as the "postinstall" step. This patch creates a new execution domain "postinstall" which update_engine will use to run said hook. Since the hook needs to run from the new image (namelly, slot "B"), update_engine needs to temporarly mount this B partition into /postinstall and then run a program from there. Since the new program in B runs from the old execution context in A, we can't rely on the labels set in the xattr in the new filesystem to enforce the policies baked into the old running image. Instead, when temporarily mounting the new filesystem in update_engine, we override all the new file attributes with the new postinstall_file type by passing "context=u:object_r:postinstall_file:s0" to the mount syscall. This allows us to set new rules specific to the postinstall environment that are consistent with the rules in the old system. Bug: 27177071 TEST=Deployed a payload with a trivial postinstall script to edison-eng. (cherry picked from commit 6cb2c893) Change-Id: I49a529eecf1ef0524819470876ef7c8c2659c7ef
-
- Mar 03, 2016
-
-
Stephen Smalley authored
Define new netlink socket security classes introduced by upstream kernel commit 6c6d2e9bde1c1c87a7ead806f8f5e2181d41a652 ("selinux: update netlink socket classes"). This was merged in Linux 4.2 and is therefore only required for Android kernels based on 4.2 or newer (e.g. the android-4.4 branch of the kernel/common tree). Add the new socket classes to socket_class_set. Add an initial set of allow rules although further refinement will likely be necessary. Any allow rule previously written on :netlink_socket may need to be rewritten or duplicated for one or more of the more specific classes. For now, we retain the existing :netlink_socket rules for compatibility on older kernels. Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov> (cherry picked from commit 01d95c23) Change-Id: Ic00a0d474730cda91ba3bc387e0cc14482f82114
-
Tao Bao authored
-
Andreas Gampe authored
-
Andreas Gampe authored
For apps installed /data (vs the system image), Otapreopt puts A/B artifacts alongside the regular oat location with a "b" suffix. Give Otapreopt the right to create and write such files. Bug: 25612095 Change-Id: Idf3f0959816f49407036cea9b8e684b26c510e80
-
- Mar 02, 2016
-
-
Nick Kralevich authored
-
Tao Bao authored
system_server used to communicate with uncrypt via files (e.g. /cache/recovery/command and /cache/recovery/uncrypt_status). Since A/B devices may not have /cache partitions anymore, we switch to communicate via /dev/socket/uncrypt to allow things like factory reset to keep working. Bug: 27176738 Change-Id: I73b6d6f1ecdf16fd4f3600b5e524da06f35b5bca
-
Fyodor Kupolov authored
-
Nick Kralevich authored
no longer used nor desired. Change-Id: Iac447fb2291371caa4a8ec255db114d9f7ccdddb
-
Lorenzo Colitti authored
Bug: 27239233 Change-Id: I82e3451542f08de67ad950223be90e37a2d3e899
-
Lorenzo Colitti authored
This reverts commit b5594c27. Bug: 27239233 Change-Id: I407a2f3a313f3de801080f9bae46f6bac1a803c2
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
This reverts commit 54457959. Change-Id: Idfa0254e66f9517cc26af3c37441b47cbb984bca
-
Jeff Sharkey authored
avc: denied { write } for path="/data/system_de/0/ringtones/ringtone_cache" dev="mmcblk0p44" ino=1602501 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0 Bug: 27366059 Change-Id: I120a69ac4f58c64db6f169ae4f9942ce357b0b1f
-
- Mar 01, 2016
-
-
Makoto Onuki authored
Bug 27325877 Change-Id: Idf2f9ae816e1f3d822a6286a4cf738c14e29a45e
-
Calin Juravle authored
This is a special profile folder where apps will leave profile markers for the dex files they load and don't own. System server will read the markers and decide which apk should be fully compiled instead of profile guide compiled. Apps need only to be able to create (touch) files in this directory. System server needs only to be able to check wheter or not a file with a given name exists. Bug: 27334750 Bug: 26080105 Change-Id: I2256e4aba1ec0e5117de6497123223b9a74f404e
-
- Feb 29, 2016
-
-
Nick Kralevich authored
Bluetooth uses the tun device for tethering. Allow access. STEPS TO REPRODUCE: 0. Have two devices to test on, say Device A and Device B 1. On Device A, Go to settings ->Bluetooth . 2. Turn on the Bluetooth . 3. Pair it with device B 4. Tap on the paired device OBSERVED RESULTS: -Bluetooth share crash is observed with "Bluetooth share has stopped" error message -Unable to use Bluetooth tethering due to this issue EXPECTED RESULTS: No crash and Bluetooth devices should be able to connect for tethering Addresses the following denial: com.android.bluetooth: type=1400 audit(0.0:131): avc: denied { open } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=12340 scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0 Bug: 27372573 (cherry picked from commit 9a1347ee) Change-Id: Ibd16e48c09fe80ebb4f3779214de3b4806c12497
-
- Feb 28, 2016
-
-
Marco Nelissen authored
-
Marco Nelissen authored
avc: denied { find } for service=SurfaceFlinger scontext=u:r:mediacodec:s0 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager Bug: 26990688 Change-Id: Ie7c5f6d879c286375eb52ef4c6b84726aa4f1ba2
-
- Feb 27, 2016
-
-
Nick Kralevich authored
It's a CTS requirement that all SELinux domains be in enforcing mode. Add the same assertion to the build system when targeting user builds. In particular, this avoids a situation where device integrity checking is enabled on user builds, but permissive denials are being generated, causing the device to unexpectedly reboot into safe mode. A developer wanting to put an SELinux domain into permissive mode for userdebug/eng purposes can write the following in their policy: userdebug_or_eng(` permissive foo; ') Bug: 26902605 Bug: 27313768 (cherry picked from commit bca98efa) Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
-
Jeff Tinker authored
-
Jeff Tinker authored
bug: 26782004 Change-Id: Ie3d9289d15446efa160550185a2d565e3be2980f
-
Fyodor Kupolov authored
NetworkTimeUpdateService has been registered as a system service, so that its dump state can be included into bugreports. Bug: 23983739 Change-Id: I0d364009ba4630dcfd1d22c647195e33eedaa4e0
-
- Feb 26, 2016
-
-
Jeff Vander Stoep authored
Bug: 26982110 Change-Id: I551f8cc926886de0feaf065da46d3cf5bdf5cfb5
-