1. 09 Sep, 2013 1 commit
  2. 05 Sep, 2013 1 commit
  3. 29 Aug, 2013 1 commit
  4. 28 Aug, 2013 1 commit
  5. 17 Aug, 2013 1 commit
  6. 16 Aug, 2013 1 commit
  7. 06 Aug, 2013 1 commit
  8. 05 Aug, 2013 1 commit
  9. 30 Jul, 2013 1 commit
  10. 26 Jul, 2013 1 commit
  11. 17 Jul, 2013 1 commit
  12. 16 Jul, 2013 6 commits
  13. 15 Jul, 2013 6 commits
  14. 14 Jul, 2013 1 commit
    • Nick Kralevich's avatar
      untrusted_app.te / isolated_app.te / app.te first pass · 6634a108
      Nick Kralevich authored
      This is my first attempt at creating an enforcing SELinux domain for
      apps, untrusted_apps, and isolated_apps. Much of these rules are based on the
      contents of app.te as of commit 11153ef3
      with extensive modifications, some of which are included below.
      
      * Allow communication with netd/dnsproxyd, to allow netd to handle
        dns requests
      * Allow binder communications with the DNS server
      * Allow binder communications with surfaceflinger
      * Allow an app to bind to tcp/udp ports
      * Allow all domains to read files from the root partition, assuming
        the DAC allows access.
      
      In addition, I added a bunch of "neverallow" rules, to assert that
      certain capabilities are never added.
      
      This change has a high probability of breaking someone, somewhere.
      If it does, then I'm happy to fix the breakage, rollback this change,
      or put untrusted_app into permissive mode.
      
      Change-Id: I83f220135d20ab4f70fbd7be9401b5b1def1fe35
      6634a108
  15. 13 Jul, 2013 2 commits
    • Nick Kralevich's avatar
      remove "self:process ptrace" from domain, netd neverallow rules · 9a19885c
      Nick Kralevich authored
      Remove "self:process ptrace" from all SELinux enforced domains.
      In general, a process should never need to ptrace itself.
      We can add this back to more narrowly scoped domains as needed.
      
      Add a bunch of neverallow assertions to netd.te, to verify that netd
      never gets unexpected capabilities.
      
      Change-Id: Ie862dc95bec84068536bb64705667e36210c5f4e
      9a19885c
    • Nick Kralevich's avatar
      Move *_app into their own file · 748fdef6
      Nick Kralevich authored
      app.te covers a lot of different apps types (platform_app, media_app,
      shared_app, release_app, isolated_app, and untrusted_app), all
      of which are going to have slightly different security policies.
      
      Separate the different domains from app.te. Over time, these
      files are likely to grow substantially, and mixing different domain types
      is a recipe for confusion and mistakes.
      
      No functional change.
      
      Change-Id: Ida4e77fadb510f5993eb2d32f2f7649227edff4f
      748fdef6
  16. 12 Jul, 2013 2 commits
  17. 11 Jul, 2013 3 commits
  18. 10 Jul, 2013 2 commits
  19. 08 Jul, 2013 3 commits
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · 79d59edc
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      79d59edc
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · b25fe91e
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      b25fe91e
    • The Android Automerger's avatar
  20. 03 Jul, 2013 1 commit
  21. 02 Jul, 2013 2 commits
    • The Android Automerger's avatar
    • Nick Kralevich's avatar
      installd: enable SELinux restrictions · 51946bc8
      Nick Kralevich authored
      This change enables SELinux security enforcement on the installd
      process.
      
      For the installd.te file only, this change is equivalent to reverting
      the following commits:
      
          * 50e37b93
          * 77d4731e
      
      No other changes were required.
      
      Testing: As much as possible, I've tested that package installation
      works, from both adb and via Android market. There were no denials
      in the kernel dmesg log, and everything appears to be working correctly.
      
      It's quite possible I've missed something. If we experience problems,
      I'm happy to roll back this change.
      
      Bug: 9662644
      Change-Id: Id93d4ee7b517dfa28c9a0b1d45d936b56892ac0a
      51946bc8
  22. 01 Jul, 2013 1 commit
    • Nick Kralevich's avatar
      zygote: enable SELinux restrictions · 6aca515c
      Nick Kralevich authored
      This change enables SELinux security enforcement on zygote
      (but not zygote spawned apps).
      
      For the zygote.te file only, this change is equivalent to reverting
      the following commits:
      
      * 50e37b93
      * 77d4731e
      
      No other changes were required.
      
      Testing: As much as possible, I've tested that zygote properly
      starts up, and that there's no problem spawning zygote or zygote
      apps. There were no denials in the kernel dmesg log, and
      everything appears to work correctly. It's quite
      possible I've missed something. If we experience problems, I
      happy to roll back this change.
      
      Bug: 9657732
      Change-Id: Id2a7adcbeebda5d1606cb13470fad6c3fcffd558
      6aca515c