- Aug 23, 2013
-
-
Geremy Condra authored
-
Geremy Condra authored
This is based on Joshua Brindle's sepolicy-inject. Change-Id: Ie75bd56a2996481592dcfe7ad302b52f381d5b18
-
- Aug 20, 2013
-
-
Richard Haines authored
* commit '81cdd6c6': Fix insertkeys.py to resolve keys.conf path entries in a portable way
-
Richard Haines authored
* commit '1b46b2fe': Fix insertkeys.py to resolve keys.conf path entries in a portable way
-
- Aug 17, 2013
-
-
Geremy Condra authored
* commit '553bafef': Add the ability to write shell files to the untrusted_app domain.
-
Geremy Condra authored
* commit '29d0d406': Add the ability to write shell files to the untrusted_app domain.
-
- Aug 16, 2013
-
-
Geremy Condra authored
Bug: 10290009 Change-Id: Ic794299261672b36a2b630893b65ab176c3eee6b (cherry picked from commit eaa4e844e4c8549c9b4808a1272876a6995ca5a7)
-
- Aug 14, 2013
-
-
The Android Open Source Project authored
* commit 'b74efd33': Move isolated_app.te / untrusted_app.te into permissive Grant fsetid Linux capability to vold. Add "shell" to seapp_contexts
-
The Android Open Source Project authored
Change-Id: If9a2d360a37a8641a70fb475c7f5422d0cf8b900
-
- Aug 08, 2013
-
-
Richard Haines authored
Currently a path to a key in keys.conf must be fully qualified or have the -d option appended. This fix will allow paths to have environment variables that will be expanded. This will give portability to the entries. For example the following entry will now be resolved correctly: [@NET_APPS] ALL : $ANDROID_BUILD_TOP/device/demo_vendor/demo_dev/security/net_apps.x509.pem Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead Signed-off-by:
Richard Haines <richard_c_haines@btinternet.com>
-
- Aug 06, 2013
-
-
The Android Automerger authored
-
- Aug 05, 2013
-
-
Lorenzo Colitti authored
Bug: 10175701 Change-Id: I185df22bdbaafd56725760ec6c71340b67455046
-
- Jul 30, 2013
-
-
The Android Automerger authored
-
- Jul 26, 2013
-
-
Todd Poynor authored
-
- Jul 17, 2013
-
-
The Android Automerger authored
-
- Jul 16, 2013
-
-
Alex Klyubin authored
Change-Id: Ided2cf793e94bb58529789c3075f8480c0d0cf4e
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
OTAs aren't properly labeling /system, which is causing SELinux breakage. Temporarily put isolated_app.te and untrusted_app.te into permissive. Bug: 9878561 Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
-
Nick Kralevich authored
Bug: 9872463 Change-Id: I47eabeace3387afd24c0fd4bee70e77c0a3586d5
-
The Android Automerger authored
-
Nick Kralevich authored
Bug: 9859477 Change-Id: Iadd26cac2f318b81701310788bed795dadfa5b6b
-
- Jul 15, 2013
-
-
Nick Kralevich authored
This is needed to support "Verify App" functionality. During side loading, the Verify App functionality reads the APK to determine if it's safe to install. Bug: 9863154 Change-Id: I33f6b0fd012f6cb194e253d5d92cf6189d6aa222
-
Nick Kralevich authored
-
Nick Kralevich authored
/sys was getting labeled as a rootfs file, but according to genfs_contexts, it's really a sysfs file. This conflict is causing problems when patch f29c533c49ab1c90eae612b1c454f2c6879a6658 from system/core is applied. Change-Id: I3f34c9ee68bedb171ebebfcd356e924c987b58ff
-
Nick Kralevich authored
-
Nick Kralevich authored
For some reason, the debuggerd socket isn't getting properly labeled. Work around this bug for now by allowing all domains to connect to all unix stream sockets. Bug: 9858255 Change-Id: If994e51b0201ea8cae46341efc76dc71a4e577c8
-
The Android Automerger authored
-
- Jul 14, 2013
-
-
Nick Kralevich authored
This is my first attempt at creating an enforcing SELinux domain for apps, untrusted_apps, and isolated_apps. Much of these rules are based on the contents of app.te as of commit 11153ef3 with extensive modifications, some of which are included below. * Allow communication with netd/dnsproxyd, to allow netd to handle dns requests * Allow binder communications with the DNS server * Allow binder communications with surfaceflinger * Allow an app to bind to tcp/udp ports * Allow all domains to read files from the root partition, assuming the DAC allows access. In addition, I added a bunch of "neverallow" rules, to assert that certain capabilities are never added. This change has a high probability of breaking someone, somewhere. If it does, then I'm happy to fix the breakage, rollback this change, or put untrusted_app into permissive mode. Change-Id: I83f220135d20ab4f70fbd7be9401b5b1def1fe35
-
- Jul 13, 2013
-
-
Nick Kralevich authored
Remove "self:process ptrace" from all SELinux enforced domains. In general, a process should never need to ptrace itself. We can add this back to more narrowly scoped domains as needed. Add a bunch of neverallow assertions to netd.te, to verify that netd never gets unexpected capabilities. Change-Id: Ie862dc95bec84068536bb64705667e36210c5f4e
-
Nick Kralevich authored
app.te covers a lot of different apps types (platform_app, media_app, shared_app, release_app, isolated_app, and untrusted_app), all of which are going to have slightly different security policies. Separate the different domains from app.te. Over time, these files are likely to grow substantially, and mixing different domain types is a recipe for confusion and mistakes. No functional change. Change-Id: Ida4e77fadb510f5993eb2d32f2f7649227edff4f
-
- Jul 12, 2013
-
-
Nick Kralevich authored
In 0c9708b2, we removed relabelto from unconfined.te. This broke debuggerd. Fixed. type=1400 audit(1373668537.550:5): avc: denied { relabelto } for pid=44 comm="debuggerd" name="tombstones" dev="mtdblock1" ino=71 scontext=u:r:debuggerd:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir Change-Id: Ic025cbc030d6e776d9d87b1df3240fdc5f0b53d5
-
Nick Kralevich authored
The emulator has been upgraded to ext4, which was the root cause of bug 9685803. See https://code.google.com/p/android/issues/detail?id=38561 . As a result, we can reenable installd protections. This reverts commit 201cfae4. Bug: 9685803 Change-Id: I4ed47f7aeaef4aac504e13c2ae23fb416e4e6e49
-
- Jul 11, 2013
-
-
Nick Kralevich authored
Bug: 9781325 Change-Id: Ib6f6875f690420b59fceb0a32590a2b9ed8dda95
-
The Android Automerger authored
-
Nick Kralevich authored
For unlabeled files, revert to DAC rules. This is for backwards compatibility, as files created before SELinux was in place may not be properly labeled. Over time, the number of unlabeled files will decrease, and we can (hopefully) remove this rule in the future. To prevent inadvertantly introducing the "relabelto" permission, add a neverallow domain, and add apps which have a legitimate need to relabel to this domain. Bug: 9777552 Change-Id: I71b0ff8abd4925432062007c45b5be85f6f70a88
-
- Jul 10, 2013
-
-
Nick Kralevich authored
Allow netd to set ctl.* properties. Currently, mdnsd is broken because it can't set this property. Bug: 9777774 Change-Id: I2f32504d77b651e66e0a0067e65a5ed44b427f5a
-
Geremy Condra authored
Change-Id: I129536c3d9f6359228165d8a5ec373780b312c86
-
- Jul 08, 2013
-
-
Alex Klyubin authored
This fixes the issue where paid apps failed to install via Google Play with "Package file has a bad manifest" error. The issue appears to be caused by vold being prevented by SELinux policy from setting the setgid bit on the ASEC container directory into which the APK is decrypted. As a result, the APK is not readable to PackageParser. Bug: 9736808 Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
-
Alex Klyubin authored
This fixes the issue where paid apps failed to install via Google Play with "Package file has a bad manifest" error. The issue appears to be caused by vold being prevented by SELinux policy from setting the setgid bit on the ASEC container directory into which the APK is decrypted. As a result, the APK is not readable to PackageParser. Bug: 9736808 Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
-
The Android Automerger authored
-