Skip to content
Snippets Groups Projects
  1. Apr 29, 2015
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · effcac7d
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      Bug: 20526234
      Change-Id: I3362ba07d1a7e5f1c47fe7e9ba6aec5ac3fec747
      effcac7d
  2. Apr 18, 2015
  3. Apr 17, 2015
  4. Apr 13, 2015
  5. Apr 09, 2015
    • Nick Kralevich's avatar
      gatekeeperd: neverallow non-system_server binder call · 2234f9ff
      Nick Kralevich authored
      The current neverallow rule (compile time assertion)
      
        neverallow { domain -gatekeeperd -system_server } gatekeeper_service:service_manager find;
      
      asserts that no rule is present which allows processes other than
      system_server from asking servicemanager for a gatekeeperd token.
      
      However, if system_server leaks the token to other processes, it may
      be possible for those processes to access gatekeeperd directly, bypassing
      servicemanager.
      
      Add a neverallow rule to assert that no process other than system_server
      are allowed to make binder calls to gatekeeperd. Even if another process
      was to manage to get a binder token to gatekeeperd, it would be useless.
      
      Remove binder_service() from gatekeeperd. The original use of the
      binder_service() macro was to widely publish a binder service.
      If this macro is present and the calling process has a gatekeeperd
      binder token, it's implicitly possible for the following processes
      to make a binder call to gatekeeperd:
      
       * all app processes
       * dumpstate
       * system_server
       * mediaserver
       * surfaceflinger
      
      Removing binder_service revokes this implicit access.
      
      Add explicit access for system_server to make binder calls to
      gatekeeperd.
      
      Add explicit access for gatekeeperd to make calls to keystore.
      This was implicitly granted via binder_service() before, but now
      needs to be explicit.
      
      Change-Id: I23c1573d04ab670a42660d5922b39eecf4265b66
      2234f9ff
    • Andres Morales's avatar
      Allow gatekeeperd to check Android permissions · 13abb170
      Andres Morales authored
      Change-Id: Ie88568c43642505f68d137843a1f6b7a3de481e5
      13abb170
  6. Apr 06, 2015
    • Andres Morales's avatar
      SELinux permissions for gatekeeper TEE proxy · e207986e
      Andres Morales authored
      sets up:
      - execute permissions
      - binder permission (system_server->gatekeeper->keystore)
      - prevents dumpstate and shell from finding GK binder service
      - neverallow rules for prohibited clients
      
      Change-Id: I1817933a91de625db469a20c7a4c8e2ca46efa1e
      e207986e
Loading