Skip to content
Snippets Groups Projects
  1. Oct 31, 2014
    • Nick Kralevich's avatar
      allow coredump functionality · d7e004eb
      Nick Kralevich authored
      Change-Id: I7993698ac96f21db0039681275280dbd43ff61ba
      d7e004eb
    • Igor Murashkin's avatar
      zygote/dex2oat: Grant additional symlink permissions · f7ccfd00
      Igor Murashkin authored
      * zygote needs to be able to symlink from dalvik cache to system
        to avoid having to copy boot.oat
        (when the boot.oat file was built with --compile-pic)
      * dex2oat needs to be able to read the symlink in the dalvik cache
        (the one that zygote creates)
      
      (cherry-picked from AOSP master
      83c5612e)
      
      Bug: 18035729
      Change-Id: Ie1acad81a0fd8b2f24e1f3f07a06e6fdb548be62
      f7ccfd00
  2. Oct 24, 2014
  3. Oct 23, 2014
  4. Oct 22, 2014
    • Nick Kralevich's avatar
      DO NOT MERGE: allow access to labeled executables in /system · 2c38b3b8
      Nick Kralevich authored
      Most files on /system are labeled with the "system_file" label, and
      are readable by default by all SELinux domains. However, select
      executables are labeled with their own label, so that SELinux knows
      what domains to enter upon running the executable.
      
      Allow adbd read access to labeled executables in /system. We do
      this by granting adbd read access to exec_type, the attribute
      assigned to all executables on /system.
      
      This allows "adb pull /system" to work without generating
      SELinux denials.
      
      Bug: 18078338
      Change-Id: I97783759af083968890f15f7b1d8fff989e80604
      2c38b3b8
  5. Oct 20, 2014
  6. Oct 17, 2014
  7. Oct 16, 2014
    • Nick Kralevich's avatar
      Fix compile time / CTS gps_data_files neverallow assertion · 480374e4
      Nick Kralevich authored
      Currently, zygote spawned apps are prohibited from modifying GPS
      data files. If someone tries to allow GPS access to any app domain,
      it generates a compile time / CTS exception.
      
      Relax the rules slightly for system_app. These apps run with UID=system,
      and shouldn't be banned from handling gps data files.
      
      This change doesn't add or remove any SELinux rules. Rather, it just
      relaxes a compile time assertion, allow partners to create SELinux
      rules allowing the access if they desire.
      
      Bug: 18021422
      Change-Id: Iad0c6a3627efe129246e2c817f6f71d2735eba93
      480374e4
  8. Oct 15, 2014
  9. Oct 11, 2014
  10. Oct 10, 2014
    • Nick Kralevich's avatar
      allow oemfs:dir search · ebfd9f87
      Nick Kralevich authored
      mediaserver and drmserver both have permission to read oemfs
      related files. However, there are no search permissions on the
      directory, so the files would be unreachable.
      
      Grant search permissions on the oemfs directory, so that the files
      within that directory can be read.
      
      Bug: 17954291
      Change-Id: I9e36dc7b940bd46774753c1fa07b0f47c36ff0db
      ebfd9f87
    • Nick Kralevich's avatar
      allow system_server oemfs read access · 2380d05f
      Nick Kralevich authored
      Bug: 17954291
      Change-Id: Ia904fff65df5142732928561d81ea0ece0c52a8d
      2380d05f
  11. Oct 06, 2014
  12. Oct 02, 2014
  13. Sep 26, 2014
  14. Sep 25, 2014
  15. Sep 24, 2014
    • Nick Kralevich's avatar
      allow apps to read the contents of mounted OBBs · 62083414
      Nick Kralevich authored
      Apps should be able to read the contents of mounted OBBs.
      
      Steps to reproduce:
      
        1) Install com.namcobandaigames.soulcaliburgp (SoulCalibur)
        2) Attempt to run the app.
      
      Expected:
        App runs successfully.
      
      Actual:
        App crashes. See denials below.
      
      This can also be reproduced by running the newly introduced CTS
      test in I2018b63b0236ce6b5aee4094e40473315b1948c3
      
      Addresses the following denials:
      
        avc: denied { read } for pid=4133 comm="roidJUnitRunner" name="test1.txt" dev="loop0" ino=23 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:vfat:s0 tclass=file
        avc: denied { open } for pid=4133 comm="roidJUnitRunner" name="test1.txt" dev="loop0" ino=23 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:vfat:s0 tclass=file
        avc: denied { getattr } for pid=4133 comm="roidJUnitRunner" path="/mnt/obb/f73da56689d166b5389d49ad31ecbadb/test1.txt" dev="loop0" ino=23 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:vfat:s0 tclass=file
        avc: denied { search } for name="/" dev="loop0" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0
      
      Bug: 17633509
      Change-Id: I49b722b24c1c7d9ab084ebee7c1e349d8d660ffa
      62083414
  16. Sep 23, 2014
    • Robert Sesek's avatar
      isolated_app: Do not allow access to the gpu_device. · 9de62d6f
      Robert Sesek authored
      Bug: 17471434
      
      (cherry picked from commit 7f4a8a72)
      
      Change-Id: I7d70fd4d8b8ecdd42024345d74fa36233fb76fb5
      9de62d6f
    • Nick Kralevich's avatar
      relax appdomain efs_file neverallow rules [DO NOT MERGE] · a8b651bf
      Nick Kralevich authored
      During factory provisioning, some manufacturers may need to pull files
      from /factory (label efs_file and bluetooth_efs_file) to collect
      device specific identifiers such as the mac address, using commands
      similar to the following:
      
        adb shell cat /factory/ssn
        adb shell cat /factory/bt/bd_addr.conf
        adb shell cat /factory/wifi/mac.txt
        adb shell cat /factory/60isn
      
      read-only access to these files is currently disallowed by a
      neverallow rule. Relax the rules to allow read-only access to the
      shell user if desired.
      
      No new SELinux rules are added or deleted by this change. This is
      only a relaxation in what's allowed for vendor specific policy.
      
      Bug: 17600278
      
      (cherry picked from commit 200a9f0e)
      
      Change-Id: I2e277b1068a35cc06e0973df994ec3a49f2c26e7
      a8b651bf
  17. Sep 22, 2014
    • Vineeta Srivastava's avatar
      sepolicy for oem cutomization · b4fcaeea
      Vineeta Srivastava authored
      Added read permissions for bootanimation
      
      Bug: 16635599
      Change-Id: Ib5d0ba5a6d1144ff831f4f0eda092879f853c376
      b4fcaeea
    • Nick Kralevich's avatar
      relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets · 36fb1f1b
      Nick Kralevich authored
      Netlink uevent sockets are used by the kernel to inform userspace
      when certain events occur, for example, when new hardware is added
      or removed. This allows userspace to take some action based on those
      messages.
      
      Relax the neverallow rule for NETLINK_KOBJECT_UEVENT sockets.
      Certain device specific app domains, such as system_app, may have a
      need to receive messages from this socket type.
      
      Continue to neverallow NETLINK_KOBJECT_UEVENT sockets for untrusted_app.
      These sockets have been the source of rooting attacks in Android
      in the past, and it doesn't make sense to expose this to untrusted_apps.
      
      No new SELinux rules are introduced by this change. This is an
      adjustment of compile time assertions only.
      
      Bug: 17525863
      
      (cherry picked from commit 642b8042)
      
      Change-Id: I35f3dc8b1ead9f427645a13fb202e760d1e68e64
      36fb1f1b
  18. Sep 20, 2014
  19. Sep 16, 2014
  20. Sep 13, 2014
  21. Sep 10, 2014
    • Tyler Gunn's avatar
      Renaming Telecomm to Telecom. · 69cdca91
      Tyler Gunn authored
      - Changing package from android.telecomm to android.telecom
      - Changing package from com.android.telecomm to
      com.android.server.telecomm.
      - Renaming TelecommManager to TelecomManager.
      
      Bug: 17364651
      Change-Id: I70e9ecdab7482327f25387ecc6223f46e9cbe10e
      69cdca91
  22. Sep 09, 2014
    • dcashman's avatar
    • dcashman's avatar
      Enable selinux read_policy for adb pull. · 309cc668
      dcashman authored
      Remove permission from appdomain.
      
      Bug: 16866291
      
      Change-Id: I37936fed33c337e1ab2816258c2aff52700af116
      309cc668
    • Nick Kralevich's avatar
      Allow kernel thread to read app data files · b0a99513
      Nick Kralevich authored
      When vold mounts an OBB on behalf of another application, the kernel
      spins up the "loop0" thread to perform the mount operation. Grant
      the kernel thread the ability to read app data files, so the mount
      operation can succeed.
      
      Steps to reproduce:
      
        1) Run: runtest --path cts/tests/tests/os/src/android/os/storage/cts/StorageManagerTest.java
      
      Expected:
      
        1) All tests pass
      
      Actual:
      
        Test failure, with the following error message:
      
        loop0   : type=1400 audit(0.0:46): avc: denied { read } for path="/data/data/com.android.cts.stub/files/test1.obb" dev="mmcblk0p16" ino=115465 scontext=u:r:kernel:s0 tcontext=u:object_r:app_data_file:s0 tclass=file permissive=0
        Vold    : Image mount failed (I/O error)
        MountService: Couldn't mount OBB file: -1
        StorageManager: Received message.  path=/data/data/com.android.cts.stub/files/test1.obb, state=21
        TestRunner: failed: testMountAndUnmountObbNormal(android.os.storage.cts.StorageManagerTest)
        TestRunner: ----- begin exception -----
        TestRunner: junit.framework.AssertionFailedError: OBB should be mounted
        TestRunner:    at junit.framework.Assert.fail(Assert.java:50)
        TestRunner:    at junit.framework.Assert.assertTrue(Assert.java:20)
        TestRunner:    at android.os.storage.cts.StorageManagerTest.mountObb(StorageManagerTest.java:235)
      
      Bug: 17428116
      Change-Id: Id1a39a809b6c3942ff7e08884b40e3e4eec73b6a
      b0a99513
  23. Sep 08, 2014
    • dcashman's avatar
      Add support for factory reset protection. · 47bd7300
      dcashman authored
      Address the following denials:
      <12>[  417.732129] type=1400 audit(365340.189:47): avc: denied { read } for pid=1737 comm="Binder_2" name="mmcblk0p18" dev="tmpfs" ino=12406 scontext=u:r:system_server:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
      <12>[  417.882126] type=1400 audit(365340.339:48): avc: denied { read } for pid=1737 comm="Binder_2" name="mmcblk0p18" dev="tmpfs" ino=12406 scontext=u:r:system_server:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
      
      Bug: 16710840
      Change-Id: I8cb5b4b17dffe14f0bf05d63eb8f6ab8d5c09f53
      47bd7300
Loading