Skip to content
Snippets Groups Projects
  1. Apr 09, 2015
    • dcashman's avatar
      Enforce more specific service access. · bd7f5803
      dcashman authored
      Move the remaining services from tmp_system_server_service to appropriate
      attributes and remove tmp_system_server and associated logging:
      
      registry
      restrictions
      rttmanager
      scheduling_policy
      search
      sensorservice
      serial
      servicediscovery
      statusbar
      task
      textservices
      telecom_service
      trust_service
      uimode
      updatelock
      usagestats
      usb
      user
      vibrator
      voiceinteraction
      wallpaper
      webviewupdate
      wifip2p
      wifi
      window
      
      Bug: 18106000
      Change-Id: Ia0a6d47099d82c53ba403af394537db6fbc71ca0
      bd7f5803
  2. Apr 08, 2015
    • dcashman's avatar
      Enforce more specific service access. · 03a6f64f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      network_management
      network_score
      notification
      package
      permission
      persistent
      power
      print
      processinfo
      procstats
      
      Bug: 18106000
      Change-Id: I9dfb41fa41cde72ef0059668410a2e9eb1af491c
      03a6f64f
    • Nick Kralevich's avatar
      system_server: support hard linking for split APKs · 9bef2502
      Nick Kralevich authored
      Commit 85ce2c70 removed hard link
      support from create_file_perms, but system_server requires hard
      link support for split APKs. Allow it.
      
      Addresses the following denial:
      
        audit(0.0:152): avc: denied { link } for name="base.apk" dev="dm-0" ino=816009 scontext=u:r:system_server:s0 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
      
      Steps to reproduce:
      1) Find the directory "hellogoogle3.splitapk"
      2) adb install-multiple -r hellogoogle3_incremental.apk
      3) adb install-multiple -r -p com.google.android.samples.hellogoogle3 native.apk
      
      Expected:
        2nd APK installs successfully.
      
      Actual:
        2nd APK fails to install.
      
      Change-Id: Ib69fc70dd1c7cd158590db3fd117d6b05acf1cf7
      9bef2502
  3. Apr 07, 2015
    • Nick Kralevich's avatar
      Allow system_server to collect app heapdumps (debug builds only) · 8a06c077
      Nick Kralevich authored
      On debuggable builds, system_server can request app heap dumps
      by running something similar to the following commands:
      
        % adb shell am set-watch-heap com.android.systemui 1048576
        % adb shell dumpsys procstats --start-testing
      
      which will dump the app's heap to /data/system/heapdump. See
      framework/base commit b9a5e4ad30c9add140fd13491419ae66e947809d.
      
      Allow this behavior.
      
      Addresses the following denial:
      
        avc: denied { write } for path="/data/system/heapdump/javaheap.bin" dev="dm-0" ino=150747 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
      
      Bug: 20073185
      Change-Id: I4b925033a5456867caf2697de6c2d683d0743540
      8a06c077
    • dcashman's avatar
      Enforce more specific service access. · 91b7c67d
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      jobscheduler
      launcherapps
      location
      lock_settings
      media_projection
      media_router
      media_session
      mount
      netpolicy
      netstats
      
      Bug: 18106000
      Change-Id: Ia82d475ec41f658851f945173c968f4abf57e7e1
      91b7c67d
    • dcashman's avatar
      Enforce more specific service access. · 3cc6fc5f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      diskstats
      display
      dreams
      dropbox
      ethernet
      fingerprint
      graphicstats
      hardware
      hdmi_control
      input_method
      input_service
      
      Bug: 18106000
      Change-Id: Iadd8aab9e78d9d39fb00cf0b5a95fa1927d02095
      3cc6fc5f
    • Fyodor Kupolov's avatar
      Allow system_server to read oat dir · 3af8c9d0
      Fyodor Kupolov authored
      Required for PackageManagerService to perform restorecon recursively on a
      staging dir.
      
      Addresses the following denial:
      avc: denied { open } for name="oat" dev="mmcblk0p28" ino=163027 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=dir
      
      Bug: 19550105
      Bug: 20087446
      Change-Id: I0f6ebb79745091ecb4d6d3dbe92f65606b7469da
      3af8c9d0
    • dcashman's avatar
      Enforce more specific service access. · d4c78f4b
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      battery
      bluetooth_manager
      clipboard
      commontime_management
      connectivity
      content
      country_detector
      device_policy
      deviceidle
      
      Bug: 18106000
      Change-Id: I0d0f2a075c0509a783631d88ba453ac13399cdf2
      d4c78f4b
    • Jeff Sharkey's avatar
      Allow installd to dexopt apps on expanded storage. · 44c95e9a
      Jeff Sharkey authored
      avc: denied { search } for name="expand" dev="tmpfs" ino=3130 scontext=u:r:installd:s0 tcontext=u:object_r:mnt_expand_file:s0 tclass=dir permissive=0
      
      Bug: 19993667
      Change-Id: Ie53df62aa79ae14cd56d7c6f2429b4be382164d1
      44c95e9a
    • Jeff Sharkey's avatar
      Initial policy for expanded storage. · 73d9c2a9
      Jeff Sharkey authored
      Expanded storage supports a subset of the features of the internal
      data partition.  Mirror that policy for consistency.  vold is also
      granted enough permissions to prepare initial directories.
      
      avc: denied { write } for name="ext" dev="tmpfs" ino=3130 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { add_name } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { create } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { mounton } for path="/mnt/ext/57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { getattr } for path="/mnt/ext" dev="tmpfs" ino=3130 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=4471 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      avc: denied { getattr } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/media" dev="dm-0" ino=145153 scontext=u:r:vold:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1
      
      avc: denied { rmdir } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=6380 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      
      avc: denied { create } for name="tmp" scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="tmp" dev="dm-0" ino=72578 scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      
      Bug: 19993667
      Change-Id: I73c98b36e7c066f21650a9e16ea82c5a0ef3d6c5
      73d9c2a9
  4. Apr 06, 2015
    • Andres Morales's avatar
      SELinux permissions for gatekeeper TEE proxy · e207986e
      Andres Morales authored
      sets up:
      - execute permissions
      - binder permission (system_server->gatekeeper->keystore)
      - prevents dumpstate and shell from finding GK binder service
      - neverallow rules for prohibited clients
      
      Change-Id: I1817933a91de625db469a20c7a4c8e2ca46efa1e
      e207986e
    • Nick Kralevich's avatar
      dumpstate: allow df on /storage/emulated · c24d90cb
      Nick Kralevich authored
      dumpstate runs "df" on all mounted filesystems. Allow dumpstate
      to access /storage/emulated so df works.
      
      Addresses the following denial:
      
        avc: denied { search } for pid=4505 comm="df" name="/" dev="tmpfs" ino=6207 scontext=u:r:dumpstate:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      
      Change-Id: I99dac8321b19952e37c0dd9d61a680a27beb1ae8
      c24d90cb
    • dcashman's avatar
      Assign app_api_service attribute to services. · 4cdea7fc
      dcashman authored
      Assign the alarm, appwidget, assetatlas, audio, backup and batterystats services
      the appropriate service access levels and move into enforcing.
      
      Bug: 18106000
      Change-Id: If3210bb25f3076edfdb6eec36ef6521ace1bd8d7
      4cdea7fc
  5. Apr 03, 2015
  6. Apr 02, 2015
    • Nick Kralevich's avatar
      netd dontaudit fsetid · 8d200817
      Nick Kralevich authored
      For the reasons explained in the pre-existing code, we don't want
      to grant fsetid to netd, nor do we want denial messages to be
      generated.
      
      Change-Id: I34dcea81acd25b4eddc46bb54ea0d828b33c5fdc
      8d200817
    • Fyodor Kupolov's avatar
      Support for storing OAT files in app directory · b87a4b16
      Fyodor Kupolov authored
      oat dir inside apk_tmp_file should be labeled as dalvikcache_data_file.
      
      Bug: 19550105
      Change-Id: Ie928b5f47bfc42167bf86fdf10d6913ef25d145d
      b87a4b16
    • Nick Kralevich's avatar
      b62b2020
    • Johan Redestig's avatar
      nfc: allow sending bugreports via nfc · 386a0f09
      Johan Redestig authored
      Same change as 9819a6 but for nfc.
      
      Nfc can receive bugreport data for beaming to another device.
      This comes across as an open file descriptor. Allow nfc access
      to bugreports.
      
      Addresses the following denial:
      
        avc: denied { read } for path="/data/data/com.android.shell/files/bugreports/bugreport-2015-03-30-04-49-57.txt" dev="mmcblk0p27" ino=82334 scontext=u:r:nfc:s0 tcontext=u:object_r:shell_data_file:s0 tclass=file op_res=-13 ppid=435 pcomm="main" tgid=23475 tgcomm="m.android.shell"
      
      Change-Id: I3efefcdb46444a1a6520803cb5e68bbdf29d3ad6
      386a0f09
    • Nick Kralevich's avatar
      domain: relax execmod restrictions · 998ce77f
      Nick Kralevich authored
      Some devices still have pre-built binaries with text relocations
      on them. As a result, it's premature to assert a neverallow rule
      for files in /system
      
      Bug: 20013628
      Change-Id: I3a1e43db5c610164749dee6882f645a0559c789b
      998ce77f
  7. Apr 01, 2015
Loading