Skip to content
Snippets Groups Projects
  1. Apr 24, 2015
  2. Apr 20, 2015
  3. Apr 18, 2015
    • Jeff Sharkey's avatar
      Grant apps write access to returned vfat FDs. · e98cda25
      Jeff Sharkey authored
      Users can pick files from vfat devices through the Storage Access
      Framework, which are returned through ParcelFileDescriptors.  Grant
      apps write access to those files.  (Direct access to the files on
      disk is still controlled through normal filesystem permissions.)
      
      avc: denied { write } for pid=3235 comm="Binder_1" path=2F6D6E742F6D656469615F72772F373243322D303446392F6D656F772F6D79206469722F706963322E706E67 dev="sdb1" ino=87 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I24b4d8826f0a35825b2abc63d1cfe851e1c1bfe9
      e98cda25
    • Jeff Sharkey's avatar
      Grant platform apps access to /mnt/media_rw. · c9036fb1
      Jeff Sharkey authored
      Raw physical storage devices are mounted by vold under /mnt/media_rw
      and then wrapped in a FUSE daemon that presents them under /storage.
      
      Normal apps only have access through /storage, but platform apps
      (such as ExternalStorageProvider) often bypass the FUSE daemon for
      performance reasons.
      
      avc: denied { search } for pid=6411 comm="Binder_1" name="media_rw" dev="tmpfs" ino=6666 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir
      avc: denied { write } for pid=3701 comm="Binder_2" name="PANO_20131016_162457.jpg" dev="sda1" ino=127 scontext=u:r:platform_app:s0:c522,c768 tcontext=u:object_r:vfat:s0 tclass=file
      
      Bug: 19993667
      Change-Id: I66df236eade3ca25a10749dd43d173ff4628cfad
      c9036fb1
    • Nick Kralevich's avatar
      gatekeeperd: use more specific label for /data file · 367757d2
      Nick Kralevich authored
      Use a more specific label for /data/misc/gatekeeper
      
      Rearrange some other rules.
      
      Change-Id: Ib634e52526cf31a8f0a0e6d12bbf0f69dff8f6b5
      367757d2
  4. Apr 17, 2015
  5. Apr 16, 2015
  6. Apr 14, 2015
  7. Apr 13, 2015
  8. Apr 12, 2015
  9. Apr 11, 2015
  10. Apr 10, 2015
    • Jeff Sharkey's avatar
    • Nick Kralevich's avatar
      Revert "Exclude isolated_app from ptrace self." · 50d50621
      Nick Kralevich authored
      Google Breakpad (crash reporter for Chrome) relies on ptrace
      functionality. Without the ability to ptrace, the crash reporter
      tool is broken.
      
      Addresses the following denial:
      
        type=1400 audit(1428619926.939:1181): avc: denied { ptrace } for pid=10077 comm="CrRendererMain" scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:r:isolated_app:s0:c512,c768 tclass=process permissive=0
      
      This reverts commit e9623d8f.
      
      Bug: 20150694
      Bug: https://code.google.com/p/chromium/issues/detail?id=475270
      Change-Id: I1727c6a93f10ea6db877687a8f81ec789f9e501f
      50d50621
    • Nick Kralevich's avatar
    • Jeff Sharkey's avatar
      Allow installd to move around private app data. · 8da7876b
      Jeff Sharkey authored
      Add rules that allow installd to move private app data between
      internal and expanded storage devices.  For now we'll be reusing
      the "cp" binary using android_fork_execvp(), so grant access to
      devpts.
      
      avc: denied { read write } for name="14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      avc: denied { open } for path="/dev/pts/14" dev="devpts" ino=17 scontext=u:r:installd:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      
      avc: denied { read } for name="com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { open } for path="/data/data/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="mmcblk0p16" ino=114672 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      avc: denied { create } for name="com.android.opengl.shaders_cache" scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      avc: denied { read write open } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/user/0/com.example.playground/code_cache/com.android.opengl.shaders_cache" dev="dm-0" ino=64518 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=1
      
      Bug: 19993667
      Change-Id: I5188e660c8b5e97eab8f0c74147499ec688f3f19
      8da7876b
  11. Apr 09, 2015
    • Nick Kralevich's avatar
      isolated_app: Do not allow access to the gpu_device. · f1b5c665
      Nick Kralevich authored
      Bug: 17471434
      Bug: 18609318
      Change-Id: Idb3ed8ada03dbc07f35e74fd80cb989c8e6808bc
      f1b5c665
    • Nick Kralevich's avatar
      gatekeeperd: neverallow non-system_server binder call · 2234f9ff
      Nick Kralevich authored
      The current neverallow rule (compile time assertion)
      
        neverallow { domain -gatekeeperd -system_server } gatekeeper_service:service_manager find;
      
      asserts that no rule is present which allows processes other than
      system_server from asking servicemanager for a gatekeeperd token.
      
      However, if system_server leaks the token to other processes, it may
      be possible for those processes to access gatekeeperd directly, bypassing
      servicemanager.
      
      Add a neverallow rule to assert that no process other than system_server
      are allowed to make binder calls to gatekeeperd. Even if another process
      was to manage to get a binder token to gatekeeperd, it would be useless.
      
      Remove binder_service() from gatekeeperd. The original use of the
      binder_service() macro was to widely publish a binder service.
      If this macro is present and the calling process has a gatekeeperd
      binder token, it's implicitly possible for the following processes
      to make a binder call to gatekeeperd:
      
       * all app processes
       * dumpstate
       * system_server
       * mediaserver
       * surfaceflinger
      
      Removing binder_service revokes this implicit access.
      
      Add explicit access for system_server to make binder calls to
      gatekeeperd.
      
      Add explicit access for gatekeeperd to make calls to keystore.
      This was implicitly granted via binder_service() before, but now
      needs to be explicit.
      
      Change-Id: I23c1573d04ab670a42660d5922b39eecf4265b66
      2234f9ff
    • dcashman's avatar
    • dcashman's avatar
      Make persistent_data_block_service a system_api_service. · 53212794
      dcashman authored
      Settings needs to be able to access it when opening developer options.
      
      Address the following denial:
      avc:  denied  { find } for service=persistent_data_block scontext=u:r:system_app:s0 tcontext=u:object_r:persistent_data_block_service:s0 tclass=service_manager
      
      Bug: 20131472
      Change-Id: I85e2334a92d5b8e23d0a75312c9b4b5bf6aadb0b
      53212794
    • dcashman's avatar
      Merge "Make backup service app_api_service." · dd31d68f
      dcashman authored
      dd31d68f
    • dcashman's avatar
      Make backup service app_api_service. · 9378ceaf
      dcashman authored
      Backup service needs to be accessible to all apps to notify the system when
      something changes which is being backed-up.
      
      Bug: 18106000
      Change-Id: I8f34cca64299960fa45afc8d09110123eb79338b
      9378ceaf
    • dcashman's avatar
      Merge "Enforce more specific service access." · 7f2bb0c1
      dcashman authored
      7f2bb0c1
    • Nick Kralevich's avatar
      isolated_app: allow app_data_file lock · 53c84ed4
      Nick Kralevich authored
      Chrome's WebSQL implementation works by running sqlite in the
      sandboxed renderer process, and sqlite expects to be able to
      call flock() on the database file.
      
      Bug: 20134929
      Change-Id: Id33a2cd19b779144662056c6f3aba3365b0a2a54
      53c84ed4
    • dcashman's avatar
      Enforce more specific service access. · bd7f5803
      dcashman authored
      Move the remaining services from tmp_system_server_service to appropriate
      attributes and remove tmp_system_server and associated logging:
      
      registry
      restrictions
      rttmanager
      scheduling_policy
      search
      sensorservice
      serial
      servicediscovery
      statusbar
      task
      textservices
      telecom_service
      trust_service
      uimode
      updatelock
      usagestats
      usb
      user
      vibrator
      voiceinteraction
      wallpaper
      webviewupdate
      wifip2p
      wifi
      window
      
      Bug: 18106000
      Change-Id: Ia0a6d47099d82c53ba403af394537db6fbc71ca0
      bd7f5803
    • Neil Fuller's avatar
      Add rules for /system/bin/tzdatacheck · e6475785
      Neil Fuller authored
      Bug: 19941636
      Change-Id: I7cc61e058424c856da88f11ff9b259f34cb39dc7
      e6475785
    • Andres Morales's avatar
Loading