Skip to content
Snippets Groups Projects
  1. Mar 02, 2016
    • Jeff Sharkey's avatar
      Allow Phone to write cached ringtones. · 8c09b65d
      Jeff Sharkey authored
      avc: denied { write } for path="/data/system_de/0/ringtones/ringtone_cache" dev="mmcblk0p44" ino=1602501 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0
      
      Bug: 27366059
      Change-Id: I120a69ac4f58c64db6f169ae4f9942ce357b0b1f
      8c09b65d
  2. Feb 22, 2016
    • Tao Bao's avatar
      Add recovery service. · 45f8e4af
      Tao Bao authored
      RecoverySystemService is separated from PowerManagerService as a
      dedicated system service to handle recovery related requests (such as
      invoking uncrypt to uncrypt an OTA package on /data or to set up /
      clear the bootloader control block (i.e. /misc) and etc).
      
      The matching CL in frameworks/base is in:
        Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.
      
      Bug: 26830925
      Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
      (cherry picked from commit 65b5fde9)
      45f8e4af
  3. Feb 10, 2016
    • dcashman's avatar
      Make voiceinteractionservice app_api_service. · 8f5a891f
      dcashman authored
      Address the following denial from 3rd party voice interaction test:
      SELinux : avc:  denied  { find } for service=voiceinteraction pid=30281 uid=10139 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=0
      
      Bug: 27105570
      Change-Id: Ib87d364673cbc883df017bcda7fe1e854a76654f
      8f5a891f
  4. Feb 09, 2016
  5. Feb 05, 2016
    • Daichi Hirono's avatar
      Add SELinux label for app fuse. · e178ac5a
      Daichi Hirono authored
      The labels for filesystem and files are assigned by vold with using
      context= mount option.
      
      Change-Id: I8a9d701a46a333093a27107fc3c52b17a2af1a94
      e178ac5a
  6. Jan 28, 2016
  7. Jan 27, 2016
  8. Jan 26, 2016
    • dcashman's avatar
      Reduce accessibility of voiceinteraction_service. · aedf2236
      dcashman authored
      The services under this label are not meant to be exposed to all apps.
      Currently only priv_app needs access.
      
      Bug: 26799206
      Change-Id: I07c60752d6ba78f27f90bf5075bcab47eba90b55
      aedf2236
    • Tao Bao's avatar
      Allow update_engine to use Binder IPC. · dce317cf
      Tao Bao authored
      Register service with servicemanager and name the context.
      
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      
      Also allow priv_app to communicate with update_engine.
      
      avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
      avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
      avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
      
      Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
      dce317cf
  9. Jan 22, 2016
  10. Jan 16, 2016
    • Nick Kralevich's avatar
      priv_app.te: drop auditallows on cache_recovery_file · b8d794a1
      Nick Kralevich authored
      This is actually used. Addresses the following SELinux audit logs:
      
        avc: granted { create } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { add_name } for comm="Thread-157" name="uncrypt_file" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
        avc: granted { write } for comm="Thread-157" path="/cache/recovery/uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { write } for comm="Thread-157" path="/cache/recovery/command" dev="mmcblk0p38" ino=23 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
        avc: granted { setattr } for comm="Thread-157" name="uncrypt_file" dev="mmcblk0p38" ino=22 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0:c512,c768 tclass=file
      
      Change-Id: Idab00ebc8eacd7d8bb793b9342249227f91986a1
      b8d794a1
  11. Jan 08, 2016
    • Nick Kralevich's avatar
      priv_app.te: refine cache_recovery_file auditallow rules · eb6656ce
      Nick Kralevich authored
      priv_app reads from /cache/recovery, but I'm still not sure if
      it writes. Eliminate the read auditallow rules and allow the
      writes to show up (if any).
      
      Eliminates the following auditallow messages:
      
        avc: granted { search } for comm="IntentService[S" name="recovery" dev="mmcblk0p38" ino=12 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
        avc: granted { getattr } for comm="Thread-1" path="/cache/recovery/last_install" dev="mmcblk0p27" ino=29891 scontext=u:r:priv_app:s0:c525,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=file
        avc: granted { read open } for comm="Thread-1" name="recovery" dev="mmcblk0p27" ino=29889 scontext=u:r:priv_app:s0:c525,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
      
      Change-Id: Ibc0640f5366aae50e3fd09d17657374390b24a5c
      eb6656ce
  12. Jan 06, 2016
  13. Jan 04, 2016
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
    • dcashman's avatar
      Create sysfs_zram label. · 36f255ff
      dcashman authored
      Address following denials:
      avc: denied { getattr } for path="/sys/devices/virtual/block/zram0/disksize" dev="sysfs" ino=14958 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { search } for name="zram0" dev="sysfs" ino=14903 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { read } for name="mem_used_total" dev="sysfs" ino=14970 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { write } for name="uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { open } for path="/sys/devices/virtual/block/zram0/uevent" dev="sysfs" ino=14904 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=file permissive=0
      avc: denied { read } for pid=348 comm="vold" name="zram0" dev="sysfs" ino=15223 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      avc: denied { search } for pid=3494 comm="ContactsProvide" name="zram0"dev="sysfs" ino=15223 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
      
      Bug: 22032619
      Change-Id: I40cf918b7cafdba6cb3d42b04b1616a84e4ce158
      36f255ff
  14. Dec 24, 2015
    • Daichi Hirono's avatar
      Add new rules for appfuse. · a20802dd
      Daichi Hirono authored
      The new rules are used to allow to mount FUSE file system for priv-app.
      
      Change-Id: I5ce2d261be501e2b3fef09b7666f1e5d1cddbe52
      a20802dd
  15. Dec 08, 2015
  16. Dec 03, 2015
  17. Nov 03, 2015
    • Jeff Vander Stoep's avatar
      Create attribute for moving perms out of domain · d22987b4
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
      d22987b4
  18. Oct 27, 2015
  19. Oct 19, 2015
    • Jeff Vander Stoep's avatar
      grant priv_app access to /dev/mtp_usb · bcbb32e7
      Jeff Vander Stoep authored
      android.process.media needs access to mtp_usb when MTP is enabled.
      
      Bug: 25074672
      Change-Id: Ic48a3ba8e4395104b0b957f7a9bad69f0e5ee38e
      bcbb32e7
    • Jeff Vander Stoep's avatar
      Policy for priv_app domain · 7f09a945
      Jeff Vander Stoep authored
      Verifier needs access to apk files.
      avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0
      
      Give bluetooth_manager_service and trust_service the app_api_service
      attribute.
      avc:  denied  { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0
      avc:  denied  { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0
      
      Bug: 25066911
      Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
      7f09a945
  20. Oct 15, 2015
  21. Oct 14, 2015
Loading