1. 15 Nov, 2013 1 commit
    • Jeff Sharkey's avatar
      Let vold mount OBB files on external storage. · 80176dc4
      Jeff Sharkey authored
      Fixes this specific violation:
      
      type=1400 audit(1384468728.202:16): avc:  denied { read write } for
      pid=271 comm="vold" name="test1.obb" dev="fuse" ino=3100664872
      scontext=u:r:vold:s0 tcontext=u:object_r:sdcard_internal:s0
      tclass=file
      
      Bug: 11693888
      Change-Id: I45d30ecabdf0bc8871f3dd67b5695ac909109d9a
      80176dc4
  2. 17 Oct, 2013 1 commit
  3. 10 Oct, 2013 1 commit
    • Geremy Condra's avatar
      DO NOT MERGE Fix denials seen during device upgrade. · 4fc702ec
      Geremy Condra authored
      Fixes:
      denied  { relabelto } for  pid=721 comm="PackageManager" name="vmdl-112554949.tmp" dev="mmcblk0p30" ino=712747 scontext=u:r:system:s0 tcontext=u:object_r:apk_private_tmp_file:s0 tclass=file
      denied  { create } for  pid=240 comm="vold" name="smdl2tmp1.asec" scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 11149726
      Change-Id: Iddc7592c757375a961f0d392c27622073c141b36
      4fc702ec
  4. 11 Sep, 2013 2 commits
  5. 08 Jul, 2013 2 commits
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · 79d59edc
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      79d59edc
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · b25fe91e
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      b25fe91e
  6. 29 Jun, 2013 1 commit
    • Nick Kralevich's avatar
      Enable SELinux on vold · 7914a47f
      Nick Kralevich authored
      This change enables SELinux security enforcement on vold.
      
      For the vold.te file ONLY, this change is conceptually a revert of
      77d4731e and
      50e37b93, with the following
      additional changes:
      
      1) Removal of "allow vold proc:file write;" and
      "allow vold self:capability { sys_boot };". As of system/vold
      change adfba3626e76c1931649634275d241b226cd1b9a, vold no longer
      performs it's own reboots, so these capabilities are no longer
      needed.
      
      2) Addition of the powerctl property, which vold contacts to
      tell init to reboot.
      
      3) Removal of "allow vold kernel:system module_request;". As of
      CTS commit f2cfdf5c057140d9442fcfeb4e4a648e8258b659, Android
      devices no longer ship with loadable modules, hence we don't
      require this rule.
      
      4) Removal of "fsetid" from "self:capability". Any setuid / setgid
      bits SHOULD be cleared if vold is able to change the permissions
      of files. IMHO, it was a mistake to ever include this capability in
      the first place.
      
      Testing: As much as possible, I've tested filesystem related
      functionality, including factory reset and device encryption.
      I wasn't able to test fstrim functionality, which is a fairly
      new feature.  I didn't see any policy denials in dmesg. It's quite
      possible I've missed something. If we experience problems, I
      happy to roll back this change.
      
      Bug: 9629920
      Change-Id: I683afa0dffe9f28952287bfdb7ee4e0423c2e97a
      7914a47f
  7. 20 May, 2013 1 commit
    • repo sync's avatar
      Make all domains unconfined. · 77d4731e
      repo sync authored
      This prevents denials from being generated by the base policy.
      Over time, these rules will be incrementally tightened to improve
      security.
      
      Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
      77d4731e
  8. 15 May, 2013 1 commit
  9. 10 May, 2013 2 commits
  10. 09 May, 2013 1 commit
  11. 08 May, 2013 2 commits
  12. 05 Apr, 2013 3 commits
  13. 04 Apr, 2013 1 commit
  14. 22 Mar, 2013 1 commit
    • William Roberts's avatar
      Split internal and external sdcards · c195ec31
      William Roberts authored
      Two new types are introduced:
      sdcard_internal
      sdcard_external
      
      The existing type of sdcard, is dropped and a new attribute
      sdcard_type is introduced.
      
      The boolean app_sdcard_rw has also been changed to allow for
      controlling untrusted_app domain to use the internal and external
      sdcards.
      
      Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
      c195ec31
  15. 22 Oct, 2012 1 commit
  16. 12 Jul, 2012 1 commit
  17. 04 Apr, 2012 1 commit
    • Stephen Smalley's avatar
      Add policy for property service. · 124720a6
      Stephen Smalley authored
      New property_contexts file for property selabel backend.
      New property.te file with property type declarations.
      New property_service security class and set permission.
      Allow rules for setting properties.
      124720a6
  18. 04 Jan, 2012 1 commit