Skip to content
Snippets Groups Projects
  1. Jul 25, 2014
    • Nick Kralevich's avatar
      Allow sdcardd to read /data/.layout_version · 792d8650
      Nick Kralevich authored
      As described in the system/core commit with the same Change-Id,
      there's a race condition between installd and sdcard when it
      comes to accessing /data/media. Resolve the race by checking
      /data/.layout_version to make sure the filesystem has been upgraded.
      
      Maybe indirectly fixes the following SELinux denial:
      
        sdcard  : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      
      Bug: 16329437
      Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
      792d8650
  2. Jul 24, 2014
  3. Jul 22, 2014
  4. Jul 18, 2014
  5. Jul 21, 2014
  6. Jul 18, 2014
  7. Jul 17, 2014
  8. Jul 16, 2014
    • Michael Wright's avatar
      Add MediaProjectionManagerService to service list DO NOT MERGE · 0ccfd5da
      Michael Wright authored
      Change-Id: I66a88b5dafc295e6daa9f4c0225aa593c97fe187
      0ccfd5da
    • Nick Kralevich's avatar
      dex2oat: fix forward-locked upgrades with unlabeled asecs · e4aa75db
      Nick Kralevich authored
      dex2oat fails when upgrading unlabeled asec containers.
      
      Steps to reproduce:
      
      1) Install a forward locked app on Android 4.1
        adb install -l foo.apk
      2) Upgrade to tip-of-tree
      
      Addresses the following denial:
      
        <4>[  379.886665] type=1400 audit(1405549869.210:4): avc: denied { read } for pid=2389 comm="dex2oat" path="/mnt/asec/jackpal.androidterm-1/pkg.apk" dev=dm-0 ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      (cherry picked from commit 270be6e8)
      
      Change-Id: I58dc6ebe61a5b5840434077a55f1afbeed602137
      e4aa75db
    • Nick Kralevich's avatar
      lmkd: allow lmkd to lock itself in memory · 555c3c5a
      Nick Kralevich authored
      addresses the following denial:
      
        type=1400 audit(1.871:3): avc:  denied  { ipc_lock } for  pid=1406 comm="lmkd" capability=14  scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability
      
      Bug: 16236289
      
      (cherry picked from commit 6a1405d7)
      
      Change-Id: I560f1e52eac9360d10d81fc8a9f60eba907a8466
      555c3c5a
    • Torne (Richard Coles)'s avatar
      Add "webviewupdate" system server service. · 64940d88
      Torne (Richard Coles) authored
      Define the service context for "webviewupdate", a new service that will
      run in the system server.
      
      Bug: 13005501
      Change-Id: I841437c59b362fda88d130be2f2871aef87d9231
      64940d88
    • Nick Kralevich's avatar
      dex2oat: fix forward locked apps · 94b2ba94
      Nick Kralevich authored
      dex2oat can't access file descriptors associated with asec_apk_files.
      This breaks installing forward locked apps, and generates the following
      denial:
      
        type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file
      
      Steps to reproduce:
      
        $ adb install -r -l SimpleJNI.apk
      
      Expected:
      
        app installs
      
      Actual:
      
        app fails to install.
      
      Bug: 16328233
      
      (cherry picked from commit 5259c5e6)
      
      Change-Id: I1969b9ae8d2187f4860587f7ff42d16139657b5b
      94b2ba94
    • Riley Spahn's avatar
      Remove auditallow from system_server. · d2635764
      Riley Spahn authored
      system_server auditallow statements were causing logspam and
      there is not a good way to negate services from specific devices
      so as a fix we are removing all system_server auditallows. These
      logs may not be useful anyway because I suspsect that system_server
      will probe for most all services anyway.
      
      (cherry picked from commit 5a25fbf7)
      
      Change-Id: Ibadf1ce5e66f279fc49fd8fa20dfc64c960dd57f
      d2635764
    • Riley Spahn's avatar
      Remove radio_service from untrusted_app auditallow. · 354d6cae
      Riley Spahn authored
      Change untrusted_app to not auditallow radio_service find requests
      to cut down on log spam.
      
      (cherry picked from commit af8d7ca9)
      
      Change-Id: Ibfcc1abe927b6114af5a3a82188bf9f1e009d7f7
      354d6cae
    • Colin Cross's avatar
      lmkd: allow removing cgroups and setting self to SCHED_FIFO · 2203fda5
      Colin Cross authored
      Addresses the following selinux denials:
      type=1400 audit(1405383429.107:22): avc: denied { remove_name } for pid=137 comm="lmkd" name="uid_10060" dev="cgroup" ino=18368 scontext=u:r:lmkd:s0 tcontext=u:object_r:cgroup:s0 tclass=dir permissive=0
      type=1400 audit(1405383794.109:6): avc: denied { sys_nice } for pid=1619 comm="lmkd" capability=23 scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability permissive=0
      
      (cherry picked from commit 53297318)
      
      Change-Id: I7b6e5a396bf345c4768defd7b39af2435631a35b
      2203fda5
  9. Jul 15, 2014
    • Nick Kralevich's avatar
      Tweak rules for su domain. · caf347b5
      Nick Kralevich authored
      1) Remove explicit allow statements. Since su is in permmissive,
      there's no need to ever specify allow statements for su.
      
      2) Remove unconfined_domain(su). Su is already permissive, so there's
      no need to join the unconfined domain, and it just makes getting
      rid of unconfined more difficult.
      
      3) Put su into app_domain(). This addresses, in a roundabout sorta
      way, the following denial:
      
        type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0
      
      which comes up while testing media processes as root. We already put
      the shell user into this domain, so adding su to this domain ensures
      other processes can communicate consistently with su spawned processes.
      
      Bug: 16261280
      Bug: 16298582
      
      (cherry picked from commit 213bb45b)
      
      Change-Id: If9c3483184ecdf871efee394c0b696e30f61d15d
      caf347b5
    • Riley Spahn's avatar
      Add access control for each service_manager action. · 344fc109
      Riley Spahn authored
      Add SELinux MAC for the service manager actions list
      and find. Add the list and find verbs to the
      service_manager class. Add policy requirements for
      service_manager to enforce policies to binder_use
      macro.
      
      (cherry picked from commit b8511e0d)
      
      Change-Id: I980d4a8acf6a0c6e99a3a7905961eb5564b1be15
      344fc109
    • Nick Kralevich's avatar
      fix system_server dex2oat exec · 10370f5f
      Nick Kralevich authored
      Addresses the following denial:
      
        W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0
      
      Bug: 16317188
      Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
      10370f5f
    • Ed Heyl's avatar
      reconcile aosp (c103da87) after branching. Please do not merge. · 8ee37b4f
      Ed Heyl authored
      Change-Id: Ic9dde806a30d3e7b9c4a066f247a9207fe9b94b4
      8ee37b4f
    • Ed Heyl's avatar
      reconcile aosp (3a8c5dc0) after branching. Please do not merge. · 81839dfb
      Ed Heyl authored
      Change-Id: Ic8ee83ed6ffef02bddd17e1175416fc2481db7b2
      81839dfb
    • Ed Heyl's avatar
      reconcile aosp (a7c04dcd) after branching. Please do not merge. · 7563a6f1
      Ed Heyl authored
      Change-Id: I35be7a7df73325fba921b8a354659b2b2a3e06e7
      7563a6f1
    • Ed Heyl's avatar
      reconcile aosp (4da3bb14) after branching. Please do not merge. · e9c90bdd
      Ed Heyl authored
      Change-Id: Idcd252e39b2c4829201c93b6c99cf368adcb405e
      e9c90bdd
  10. Jul 14, 2014
    • Nick Kralevich's avatar
      DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true · 2aa727e3
      Nick Kralevich authored
      Force any experimental SELinux domains (ones tagged with
      "permissive_or_unconfined") into unconfined. This flag is
      intended to be flipped when we're preparing a release,
      to eliminate inconsistencies between user and userdebug devices,
      and to ensure that we're enforcing a minimal set of rules for all
      SELinux domains.
      
      Without this change, our user builds will behave differently than
      userdebug builds, complicating testing.
      
      Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
      2aa727e3
  11. Jul 11, 2014
  12. Jul 10, 2014
Loading