- May 15, 2013
-
-
repo sync authored
Bug: 4070557 Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
-
- May 08, 2013
-
-
repo sync authored
Change-Id: I91f6965dafad54e98e2f7deda956e86acf7d0c96
-
- Apr 05, 2013
-
-
Geremy Condra authored
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
-
Robert Craig authored
/data/app-private is used when making an app purchase or forward locking. Provide a new label for the directory as well as the tmp files that appear under it. Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Apr 04, 2013
-
-
Robert Craig authored
/data/app-private is used when making an app purchase or forward locking. Provide a new label for the directory as well as the tmp files that appear under it. Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
-
- Mar 29, 2013
-
-
Geremy Condra authored
This feels like a hidden bug- it shouldn't be trying to stat everything under /cache anyways- but allowing for now. Change-Id: Ib5ddfbb408c9f0b6c6218c78a678fcdb09360ccd
-
- Mar 28, 2013
-
-
Stephen Smalley authored
Change-Id: Ib37b392cb6f6d3fb80852b9a2a6547ab86cd9bff Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Just allow them unconditionally for compatibility. Change-Id: I85b56532c6389bdfa25731042b98d8f254bd80ee Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
This feels like a hidden bug- it shouldn't be trying to stat everything under /cache anyways- but allowing for now. Change-Id: Ib5ddfbb408c9f0b6c6218c78a678fcdb09360ccd
-
- Mar 27, 2013
-
-
Geremy Condra authored
This reverts commit ba84bf1d Hidden dependency resolved. Change-Id: I9f0844f643abfda8405db2c722a36c847882c392
-
- Mar 23, 2013
-
-
Robert Craig authored
Initial policy for racoon (IKE key management). Signed-off-by:
Robert Craig <rpcraig@tycho.ncsc.mil> Change-Id: If1e344f39ea914e42afbaa021b272ba1b7113479
-
- Mar 22, 2013
-
-
Geremy Condra authored
This reverts commit 8a814a76 Change-Id: Id1497cc42d07ee7ff2ca44ae4042fc9f2efc9aad
-
Stephen Smalley authored
Change-Id: I5a3584b6cc5eda2b7d82e85452f9fe457877f1d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
Two new types are introduced: sdcard_internal sdcard_external The existing type of sdcard, is dropped and a new attribute sdcard_type is introduced. The boolean app_sdcard_rw has also been changed to allow for controlling untrusted_app domain to use the internal and external sdcards. Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
-
- Mar 19, 2013
-
-
Stephen Smalley authored
The binder_transfer_binder hook was changed in the kernel, obsoleting the receive permission and changing the target of the transfer permission. Update the binder-related policy to match the revised permission checking. Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Iad4ad43ce7ba3c00b69b7aac752b40bc2d3be002 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
rpcraig authored
Policy covers: * backup_data_file type for labeling all files/dirs under /data dealing with backup mechanism. * cache_backup_file type for labeling all files/dirs under /cache dealing with backup mechanism. This also covers the the use of LocalTransport for local archive and restore testing. * the use of 'adb shell bmgr' to initiate backup mechanism from shell. * the use of 'adb backup/restore' to archive and restore the device's data. Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Dec 05, 2012
-
-
rpcraig authored
Generic init.rc allows any process to use socket tagging. Adjust app policy to ensure that any app can read from the misc device. Change-Id: I4076f0fbc1795f57a4227492f6bfc39a4398ffa5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Oct 22, 2012
-
-
rpcraig authored
Creates 2 new types: - asec_apk_file : files found under /mnt/asec when the asec images are mounted - asec_image_file : the actual encrypted apks under /data/app-asec Change-Id: I963472add1980ac068d3a6d36a24f27233022832 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Oct 16, 2012
-
-
Joshua Brindle authored
- allow all apps to connect to the keystore over unix socket - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files - mtp connects to dnsproxyd when a pptp vpn connection is established - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device - WifiWatchDog uses packet_socket when wifi comes up - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949 Signed-off-by:
Joshua Brindle <jbrindle@tresys.com>
-
- Sep 20, 2012
-
-
Stephen Smalley authored
Used when an app service is declared with android:isolatedProcess="true". Place such processes in a separate domain, and further isolate them from each other via categories. Change-Id: I1d64f8278f0619eedb448f9a741f1d2c31985325 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Aug 10, 2012
-
-
rpcraig authored
-
- Jul 30, 2012
-
-
Haiqing Jiang authored
-
Stephen Smalley authored
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-
- Jul 27, 2012
-
-
Haiqing Jiang authored
-
Haiqing Jiang authored
-