- Mar 31, 2016
-
-
Daniel Rosenberg authored
With sdcardfs, we no longer have a separate sdcardd acting as an intermediate between the outside world and /data/media. Unless we modify sdcardfs to change contexts, we need these. Added for: adbd, kernel, mediaserver, and shell Remove this patch if sdcardfs is updated to change the secontext of fs accesses. Bug: 27915475 Bug: 27937873 Change-Id: I25edcfc7fb8423b3184db84040bda790a1042724
-
Daniel Rosenberg authored
With sdcardfs, we no longer have a separate sdcardd acting as an intermediate between the outside world and /data/media. Unless we modify sdcardfs to change contexts, we need these. Remove this patch if sdcardfs is updated to change the secontext of fs accesses. Bug: 27925072 Change-Id: I3ad37c0f12836249c83042bdc1111b6360f22b3c
-
- Mar 29, 2016
-
-
Daichi Hirono authored
To write bytes to appfuse file from priv_app, we need to specify mlstrustedobject. The CL fixes the following denial. type=1400 audit(0.0:77): avc: denied { write } for name="10" dev="fuse" ino=10 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:app_fuse_file:s0 tclass=file permissive=0 BUG=23093747 (cherry picked from commit 4d19f98c) Change-Id: I9901033bb3349d5def0bd7128db45a1169856dc1
-
- Mar 28, 2016
-
-
Calin Juravle authored
Similar to profman, dex2oat does more checks on profiles now. It needs to be able to do stat to test for existance and non-emptiness. 03-28 10:41:06.667 8611 8611 W dex2oat : type=1400 audit(0.0:129): avc: denied { getattr } for path="/data/misc/profiles/ref/com.google.android.apps.magazines/primary.prof" dev="dm-0" ino=636928 scontext=u:r:dex2oat:s0 tcontext=u:object_r:user_profile_data_file:s0 tclass=file permissive=0 Bug: 27860201 Change-Id: I3a7cb396596ae28a375ea98224ada29f093f475e
-
Calin Juravle authored
We do a bit more work checks in the runtime for the profiles and call stat on the files to see if they exists and their are not empty. SElinux error [ 297.842210] type=1400 audit(1459106986.097:7): avc: denied { getattr } for pid=4504 comm="profman" path="/data/misc/profiles/cur/0/com.google.android.youtube/primary.prof" dev="dm-1" ino=636936 scontext=u:r:profman:s0 tcontext=u:object_r:user_profile_data_file:s0:c512,c768 tclass=file permissive=0 Bug: 27860201 Change-Id: Ic97882e6057a4b5c3a16089b9b99b64bc1a3cd98
-
- Mar 25, 2016
-
-
Nick Kralevich authored
-
Mark Salyzyn authored
(cherry pick from commit 121f5bfd) 03-25 09:31:22.996 1 1 W init : type=1400 audit(0.0:8): \ avc: denied { getattr } for path="/data/misc/logd/logcat.052" \ dev="dm-2" ino=124778 scontext=u:r:init:s0 \ tcontext=u:object_r:misc_logd_file:s0 tclass=file permissive=0 . . . Introduced a new macro not_userdebug_nor_eng() Change-Id: I9c3a952c265cac096342493598fff7d41604ca45
-
Mark Salyzyn authored
(cherry pick from commit 4bf9a47e) Bug: 27176738 Change-Id: I70e4b7b54044dd541076eddd39a8e9f5d881badf
-
Nick Kralevich authored
There are now individual property files to control access to properties. Don't allow processes other than init to write to these property files. Change-Id: I184b9df4555ae5051f9a2ba946613c6c5d9d4403
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
(cherry picked from commit f2d07904) /dev/uio uio_device is already declared. Accessing uio through /sys is also common. Bug: 26990688 Change-Id: I3db941161dae31d3b87f265708abbcd9171a2c1f
-
Pierre Imai authored
-
- Mar 24, 2016
-
-
Mark Salyzyn authored
-
Mark Salyzyn authored
(cherry pick from commit 16fe52c9) One time executables. recovery_refresh can be used at any time to ensure recovery logs in pmsg are re-placed at the end of the FIFO. recovery_persist takes the recovery logs in pmsg and drops them into /data/misc/recovery/ directory. Bug: 27176738 Change-Id: Ife3cf323930fb7a6a5d1704667961f9d42bfc5ac
-
dcashman authored
sysfs_thermal nodes are common enough to warrant an entry in global policy and the new HardwarePropertiesManagerService exists explicitly to expose some of this information. Address the following denials: avc: denied { search } for name="thermal" dev="sysfs" ino=17509 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=1 avc: denied { read } for name="temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone8/temp" dev="sysfs" ino=17848 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1 Bug: 27809332 Change-Id: I2dbc737971bf37d197adf0d5ff07cb611199300d
-
Pierre Imai authored
Change-Id: I0c0bce9cd50a25897f5c4521ee9b4fada6648a59
-
- Mar 22, 2016
-
-
Nick Kralevich authored
See https://groups.google.com/d/msg/android-ndk/BbEOA9pnR-I/HgLkGy5qAgAJ Addresses the following denial: avc: denied { lock } for path="/data/data/com.mypackage/files/somefilename" dev="mmcblk0p28" ino=114736 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 While I'm here, also add lock to w_file_perms. Change-Id: I2568a228099c4e112e4a8b80da3bfcf2e35eb0ea
-
Vladislav Kuzkokov authored
-
Vladislav Kuzkokov authored
Access to modifying methods of ProxyService is checked in implementation. Bug: 27337770 Change-Id: I718ea8f4fd6be940ee9ef57f0571d884a013489b
-
Daniel Rosenberg authored
-
- Mar 19, 2016
-
-
Felipe Leme authored
Cherry picked from 610f461e (AOSP). BUG: 27419521 Change-Id: I63108468d75be3ef7f9761107a3df8997f207d07
-
- Mar 16, 2016
-
-
Nick Kralevich authored
The changes to ptrace in https://android-review.googlesource.com/#/c/175786/ (removing it from app.te and only adding it to isolated_app and untrusted_app) broke WebView crash handling in cases where privileged apps (like gmscore) use WebView. The only way to fix this would be to allow priv_app to self-ptrace as well. :/ Bug: 27697529 Change-Id: Ib9a3810dddc9f4213b6260133cbae23f669ae8dc
-
- Mar 15, 2016
-
-
Peng Xu authored
SELinux label is created for contexthub_service system service. ContextHub service manages all available context hubs and serves fulfil communication between apps and underlying context hub hardware. Change-Id: I8470fedd9c79a00012e1cdb9b548a1b632ba7de6
-
- Mar 14, 2016
-
-
dcashman authored
Applications do not explicitly request handles to the batteryproperties service, but the BatteryManager obtains a reference to it and uses it for its underlying property queries. Mark it as an app_api_service so that all applications may use this API. Also remove the batterypropreg service label, as this does not appear to be used and may have been a duplication of batteryproperties. As a result, remove the healthd_service type and replace it with a more specific batteryproperties_service type. (cherry-picked from commit: 9ed71eff) Bug: 27442760 Change-Id: I537c17c09145b302728377bf856c1147e4cc37e9
-
Polina Bondarenko authored
-
Daniel Cashman authored
-
- Mar 11, 2016
-
-
dcashman authored
HwRngTest needs access to the hwrandom sysfs files, but untrused_app does not have access to sysfs. Give these files their own label and allow the needed read access. Bug: 27263241 Change-Id: I718ba485e9e6627bac6e579f746658d85134b24b
-
- Mar 10, 2016
-
-
Daniel Cashman authored
-
Josh Gao authored
-
Nick Kralevich authored
Remove permissions which are already covered by other permissions. Found by running: sepolicy-analyze path/to/sepolicy dups No functional change. Change-Id: I526d1c1111df718b29e8276b024fa0788ad17c71
-
dcashman authored
Many permissions were removed from untrusted_app by the removal of domain_deprecated, including procfs access. procfs file access was restored, however, but not completely. Add the ability to getattr to all domains, so that other domains which lost domain_deprecated may benefit, as they will likely need it. Bug: 27249037 Change-Id: Id3f5e6121548b29d739d5e0fa6ccdbc9f0fc29be
-
Josh Gao authored
Bug: http://b/27367422 Change-Id: I936c16281e06214b35f8d245da8f619dc92ff15f (cherry picked from commit 48141c36)
-
Oleksandr Peletskyi authored
BUG: 27583869 Change-Id: I0a25bd03f3998d48dba355b91140611e38ce7b0d
-
- Mar 09, 2016
-
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { find } for service=media.drm pid=6030 uid=10012 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:mediadrmserver_service:s0 tclass=service_manager Bug: 27553530 Change-Id: I060de7ee1f66c7a545076b7de8363bebaac61f2c
-
Makoto Onuki authored
-
Polina Bondarenko authored
Bug: 27531271 Change-Id: I3c5eee86d09696373ab155f93ba6c85da224cb51
-
Torne (Richard Coles) authored
It's okay for isolated apps to connect to the webview update service to find out which APK is WebView. This enables isolated renderer processes to load their code from the WebView APK. Change-Id: Ia287280a994dbd852b4f630da5548e7b6cf4e08f
-
Makoto Onuki authored
... and client apps to read them. A full path looks like this: /data/system_ce/[user-id]/shortcut_service/bitmaps/[creator-app-package]/[timestamp].png System server will: - Create/delete the directories. - Write/remove PNG files in them. - Open the PNG files and return file descriptors to client apps Client apps will: - Receive file descriptors and read from them. Bug 27548047 Change-Id: I3d9ac6ab0c92b2953b84c3c5aabe1f653e6bea6b
-
- Mar 08, 2016
-
-
Calin Juravle authored
-