- 15 Nov, 2013 1 commit
-
-
Jeff Sharkey authored
Fixes this specific violation: type=1400 audit(1384468728.202:16): avc: denied { read write } for pid=271 comm="vold" name="test1.obb" dev="fuse" ino=3100664872 scontext=u:r:vold:s0 tcontext=u:object_r:sdcard_internal:s0 tclass=file Bug: 11693888 Change-Id: I45d30ecabdf0bc8871f3dd67b5695ac909109d9a
-
- 17 Oct, 2013 1 commit
-
-
Jeff Sharkey authored
Bug: 11175082 Change-Id: Ic1bd15e8729583be199551ec6baeb4acaf46c210
-
- 10 Oct, 2013 1 commit
-
-
Geremy Condra authored
Fixes: denied { relabelto } for pid=721 comm="PackageManager" name="vmdl-112554949.tmp" dev="mmcblk0p30" ino=712747 scontext=u:r:system:s0 tcontext=u:object_r:apk_private_tmp_file:s0 tclass=file denied { create } for pid=240 comm="vold" name="smdl2tmp1.asec" scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=file Bug: 11149726 Change-Id: Iddc7592c757375a961f0d392c27622073c141b36
-
- 11 Sep, 2013 2 commits
-
-
Geremy Condra authored
Bug: 10706792 Change-Id: I85085ab7a6f0f3d12ba4d2b21b655bb64795495f
-
Ken Sumrall authored
This is needed for the new fuse wrapped sdcard support. bug: 10330128 Change-Id: Ic5ebc769d376bf061d237616e56bcd562a63c6be
-
- 08 Jul, 2013 2 commits
-
-
Alex Klyubin authored
This fixes the issue where paid apps failed to install via Google Play with "Package file has a bad manifest" error. The issue appears to be caused by vold being prevented by SELinux policy from setting the setgid bit on the ASEC container directory into which the APK is decrypted. As a result, the APK is not readable to PackageParser. Bug: 9736808 Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
-
Alex Klyubin authored
This fixes the issue where paid apps failed to install via Google Play with "Package file has a bad manifest" error. The issue appears to be caused by vold being prevented by SELinux policy from setting the setgid bit on the ASEC container directory into which the APK is decrypted. As a result, the APK is not readable to PackageParser. Bug: 9736808 Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
-
- 29 Jun, 2013 1 commit
-
-
Nick Kralevich authored
This change enables SELinux security enforcement on vold. For the vold.te file ONLY, this change is conceptually a revert of 77d4731e and 50e37b93, with the following additional changes: 1) Removal of "allow vold proc:file write;" and "allow vold self:capability { sys_boot };". As of system/vold change adfba3626e76c1931649634275d241b226cd1b9a, vold no longer performs it's own reboots, so these capabilities are no longer needed. 2) Addition of the powerctl property, which vold contacts to tell init to reboot. 3) Removal of "allow vold kernel:system module_request;". As of CTS commit f2cfdf5c057140d9442fcfeb4e4a648e8258b659, Android devices no longer ship with loadable modules, hence we don't require this rule. 4) Removal of "fsetid" from "self:capability". Any setuid / setgid bits SHOULD be cleared if vold is able to change the permissions of files. IMHO, it was a mistake to ever include this capability in the first place. Testing: As much as possible, I've tested filesystem related functionality, including factory reset and device encryption. I wasn't able to test fstrim functionality, which is a fairly new feature. I didn't see any policy denials in dmesg. It's quite possible I've missed something. If we experience problems, I happy to roll back this change. Bug: 9629920 Change-Id: I683afa0dffe9f28952287bfdb7ee4e0423c2e97a
-
- 20 May, 2013 1 commit
-
-
repo sync authored
This prevents denials from being generated by the base policy. Over time, these rules will be incrementally tightened to improve security. Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
-
- 15 May, 2013 1 commit
-
-
repo sync authored
Bug: 4070557 Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
-
- 10 May, 2013 2 commits
-
-
Alex Klyubin authored
Change-Id: I40f3ccd9813e0a337ced0a44e686ab489277d78b
-
Alex Klyubin authored
I have no idea what vold is doing when this operation is attempted (when a full-disk encrypted device is booting up). Thus, I don't know if there is a better way of restricting the policy. Change-Id: I537b70b1abb73c36e5abf0357b766292f625e1af
-
- 09 May, 2013 1 commit
-
-
Alex Klyubin authored
klog_write/init create /dev/__kmsg__ backed by a kernel character device, keep the file descriptor, and then immediately unlink the file. Change-Id: I729d224347a003eaca29299d216a53c99cc3197c
-
- 08 May, 2013 2 commits
-
-
Alex Klyubin authored
Change-Id: I2b7bf3037c94de4fecf3c3081497e0ac1dfef8a9
-
Alex Klyubin authored
vold reboots needs to reboot the system when it succeeds or fails to encrypt partitions. Change-Id: Ibb1a5378228be60215162ae248e6c1049a16b830
-
- 05 Apr, 2013 3 commits
-
-
William Roberts authored
/data/security is another location that policy files can reside. In fact, these policy files take precedence over their rootfs counterparts under certain circumstances. Give the appropriate players the rights to read these policy files. Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
-
Stephen Smalley authored
Change-Id: I448a5553937a98775178b94f289ccb45ae862876 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
/data/security is another location that policy files can reside. In fact, these policy files take precedence over their rootfs counterparts under certain circumstances. Give the appropriate players the rights to read these policy files. Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
-
- 04 Apr, 2013 1 commit
-
-
Stephen Smalley authored
Change-Id: I448a5553937a98775178b94f289ccb45ae862876 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- 22 Mar, 2013 1 commit
-
-
William Roberts authored
Two new types are introduced: sdcard_internal sdcard_external The existing type of sdcard, is dropped and a new attribute sdcard_type is introduced. The boolean app_sdcard_rw has also been changed to allow for controlling untrusted_app domain to use the internal and external sdcards. Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
-
- 22 Oct, 2012 1 commit
-
-
rpcraig authored
Creates 2 new types: - asec_apk_file : files found under /mnt/asec when the asec images are mounted - asec_image_file : the actual encrypted apks under /data/app-asec Change-Id: I963472add1980ac068d3a6d36a24f27233022832 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- 12 Jul, 2012 1 commit
-
-
Stephen Smalley authored
-
- 04 Apr, 2012 1 commit
-
-
Stephen Smalley authored
New property_contexts file for property selabel backend. New property.te file with property type declarations. New property_service security class and set permission. Allow rules for setting properties.
-
- 04 Jan, 2012 1 commit
-
-
Stephen Smalley authored
-