Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    6634a108
    untrusted_app.te / isolated_app.te / app.te first pass · 6634a108
    Nick Kralevich authored
    This is my first attempt at creating an enforcing SELinux domain for
    apps, untrusted_apps, and isolated_apps. Much of these rules are based on the
    contents of app.te as of commit 11153ef3
    with extensive modifications, some of which are included below.
    
    * Allow communication with netd/dnsproxyd, to allow netd to handle
      dns requests
    * Allow binder communications with the DNS server
    * Allow binder communications with surfaceflinger
    * Allow an app to bind to tcp/udp ports
    * Allow all domains to read files from the root partition, assuming
      the DAC allows access.
    
    In addition, I added a bunch of "neverallow" rules, to assert that
    certain capabilities are never added.
    
    This change has a high probability of breaking someone, somewhere.
    If it does, then I'm happy to fix the breakage, rollback this change,
    or put untrusted_app into permissive mode.
    
    Change-Id: I83f220135d20ab4f70fbd7be9401b5b1def1fe35
    6634a108
    History
    untrusted_app.te / isolated_app.te / app.te first pass
    Nick Kralevich authored
    This is my first attempt at creating an enforcing SELinux domain for
    apps, untrusted_apps, and isolated_apps. Much of these rules are based on the
    contents of app.te as of commit 11153ef3
    with extensive modifications, some of which are included below.
    
    * Allow communication with netd/dnsproxyd, to allow netd to handle
      dns requests
    * Allow binder communications with the DNS server
    * Allow binder communications with surfaceflinger
    * Allow an app to bind to tcp/udp ports
    * Allow all domains to read files from the root partition, assuming
      the DAC allows access.
    
    In addition, I added a bunch of "neverallow" rules, to assert that
    certain capabilities are never added.
    
    This change has a high probability of breaking someone, somewhere.
    If it does, then I'm happy to fix the breakage, rollback this change,
    or put untrusted_app into permissive mode.
    
    Change-Id: I83f220135d20ab4f70fbd7be9401b5b1def1fe35