1. 19 Dec, 2013 1 commit
    • Takeshi Aimi's avatar
      Make bluetooth, nfc, radio and shell adb-installable · f5e90004
      Takeshi Aimi authored
      bluetooth, nfc, radio and shell are not explicitly declared
      in installd.te. This prevents applications in those group
      from upgrading by "adb install -r".
      
      You can reproduce the issue by following step:
       1. adb pull /system/priv-app/Shell.apk
       2. adb install -r Shell.apk
       3. install failed with the error log blow
      
      [Error in logcat]
      E/installd(  338): couldn't symlink directory '/data/data/com.android.shell/lib' -> '/data/app-lib/com.android.shell-1': Permission denied
      E/installd(  338): couldn't symlink directory '/data/data/com.android.shell/lib' -> '/data/app-lib/Shell': Permission denied
      
      [Error in dmesg]
      <5>[  112.053301] type=1400 audit(1387412796.071:10): avc:  denied  { create } for  pid=337 comm="installd" name="lib" scontext=u:r:installd:s0 tcontext=u:object_r:shell_data_file:s0 tclass=lnk_file
      
      This operation fails only if the app belongs to any of the
      groups specified in the commit title.
      
      Change-Id: I7572df9fb6e471fad34f61137f0eeeda4c82659d
      f5e90004
  2. 17 Sep, 2013 1 commit
    • Geremy Condra's avatar
      Fix long-tail denials in enforcing domains. · 3bb1ccc2
      Geremy Condra authored
      The specific denials we see are:
      
      denied  { getattr } for  pid=169 comm=""installd"" path=""/data/data/com.android.providers.downloads/cache/downloadfile.jpeg"" dev=""mmcblk0p23"" ino=602861 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=file
      denied  { fsetid } for  pid=598 comm=""netd"" capability=4  scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=capability
      denied  { read } for  pid=209 comm=""installd"" name=""cache"" dev=""mmcblk0p28"" ino=81694 scontext=u:r:installd:s0 tcontext=u:object_r:download_file:s0 tclass=dir
      
      Bug: 10786017
      Change-Id: Ia5d0b6337f3de6a168ac0d5a77df2a1ac419ec29
      3bb1ccc2
  3. 11 Sep, 2013 2 commits
  4. 10 Sep, 2013 3 commits
  5. 04 Sep, 2013 1 commit
  6. 12 Jul, 2013 1 commit
  7. 11 Jul, 2013 1 commit
    • Nick Kralevich's avatar
      domain.te: Add backwards compatibility for unlabeled files · 0c9708b2
      Nick Kralevich authored
      For unlabeled files, revert to DAC rules. This is for backwards
      compatibility, as files created before SELinux was in place may
      not be properly labeled.
      
      Over time, the number of unlabeled files will decrease, and we can
      (hopefully) remove this rule in the future.
      
      To prevent inadvertantly introducing the "relabelto" permission, add
      a neverallow domain, and add apps which have a legitimate need to
      relabel to this domain.
      
      Bug: 9777552
      Change-Id: I71b0ff8abd4925432062007c45b5be85f6f70a88
      0c9708b2
  8. 03 Jul, 2013 1 commit
  9. 02 Jul, 2013 1 commit
    • Nick Kralevich's avatar
      installd: enable SELinux restrictions · 51946bc8
      Nick Kralevich authored
      This change enables SELinux security enforcement on the installd
      process.
      
      For the installd.te file only, this change is equivalent to reverting
      the following commits:
      
          * 50e37b93
          * 77d4731e
      
      No other changes were required.
      
      Testing: As much as possible, I've tested that package installation
      works, from both adb and via Android market. There were no denials
      in the kernel dmesg log, and everything appears to be working correctly.
      
      It's quite possible I've missed something. If we experience problems,
      I'm happy to roll back this change.
      
      Bug: 9662644
      Change-Id: Id93d4ee7b517dfa28c9a0b1d45d936b56892ac0a
      51946bc8
  10. 20 May, 2013 1 commit
    • repo sync's avatar
      Make all domains unconfined. · 77d4731e
      repo sync authored
      This prevents denials from being generated by the base policy.
      Over time, these rules will be incrementally tightened to improve
      security.
      
      Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
      77d4731e
  11. 15 May, 2013 1 commit
  12. 05 Apr, 2013 2 commits
    • William Roberts's avatar
      Give domains read access to security_file domain. · 7bb2a55c
      William Roberts authored
      /data/security is another location that policy
      files can reside. In fact, these policy files
      take precedence over their rootfs counterparts
      under certain circumstances. Give the appropriate
      players the rights to read these policy files.
      
      Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
      7bb2a55c
    • William Roberts's avatar
      Give domains read access to security_file domain. · 6c4c27e6
      William Roberts authored
      /data/security is another location that policy
      files can reside. In fact, these policy files
      take precedence over their rootfs counterparts
      under certain circumstances. Give the appropriate
      players the rights to read these policy files.
      
      Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
      6c4c27e6
  13. 22 Oct, 2012 1 commit
  14. 27 Jul, 2012 1 commit
  15. 24 Jul, 2012 1 commit
  16. 19 Mar, 2012 1 commit
  17. 04 Jan, 2012 1 commit