Skip to content
Snippets Groups Projects
  1. Feb 24, 2014
  2. Feb 19, 2014
    • Stephen Smalley's avatar
      Add support for and use new path= specifier in seapp_contexts. · 6139de50
      Stephen Smalley authored
      
      Extend check_seapp to accept the use of the new path= specifier
      in seapp_contexts and use it to ensure proper labeling of the cache
      subdirectory of com.android.providers.downloads for restorecon.
      
      After this change, restorecon /data/data/com.android.providers.downloads/cache
      does not change the context, leaving it in download_file rather than
      relabeling it to platform_app_data_file.
      
      Depends on Iddaa3931cfd4ddd5b9f62cd66989e1f26553baa1.
      
      Change-Id: Ief65b8c8dcb44ec701d53e0b58c52d6688cc2a14
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      6139de50
  3. Sep 17, 2013
    • Alex Klyubin's avatar
      1/2: Rename domain "system" to "system_server". · 1fdee11d
      Alex Klyubin authored
      This is a follow-up CL to the extraction of "system_app" domain
      from the "system" domain which left the "system" domain encompassing
      just the system_server.
      
      Since this change cannot be made atomically across different
      repositories, it temporarily adds a typealias "server" pointing to
      "system_server". Once all other repositories have been switched to
      "system_server", this alias will be removed.
      
      Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
      1fdee11d
  4. Jun 27, 2013
    • Nick Kralevich's avatar
      Add "shell" to seapp_contexts · 86acb177
      Nick Kralevich authored
      In the process of taking a bugreport, "dumpstate -B" will instruct
      zygote to fire up com.android.shell, which runs as UID=2000.
      This transition was not included in seapp_contexts, so zygote
      didn't know how to properly set the context for the shell user.
      
      Add an entry to allow zygote to know what to do with UID=2000
      requests.
      
      Bug: 9588981
      Change-Id: I2e726be8d58437ef1de3bcbad3b897a97ed18e22
      86acb177
    • Nick Kralevich's avatar
      Add "shell" to seapp_contexts · 59444368
      Nick Kralevich authored
      In the process of taking a bugreport, "dumpstate -B" will instruct
      zygote to fire up com.android.shell, which runs as UID=2000.
      This transition was not included in seapp_contexts, so zygote
      didn't know how to properly set the context for the shell user.
      
      Add an entry to allow zygote to know what to do with UID=2000
      requests.
      
      Bug: 9588981
      Change-Id: I2e726be8d58437ef1de3bcbad3b897a97ed18e22
      59444368
  5. Mar 29, 2013
  6. Mar 28, 2013
  7. Mar 27, 2013
  8. Mar 20, 2013
    • Stephen Smalley's avatar
      Generalize levelFromUid support. · 38084146
      Stephen Smalley authored
      
      Introduce a levelFrom=none|app|user|all syntax for specifying
      per-app, per-user, or per-combination level assignment.
      levelFromUid=true|false remains valid syntax but is deprecated.
      levelFromUid=true is equivalent to levelFrom=app.
      
      Update check_seapp to accept the new syntax.
      Update seapp_contexts to document the new syntax and switch
      from levelFromUid=true to levelFrom=app.  No change in behavior.
      
      Change-Id: Ibaddeed9bc3e2586d524efc2f1faa5ce65dea470
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      38084146
  9. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  10. Oct 16, 2012
    • Joshua Brindle's avatar
      allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access · f26d8130
      Joshua Brindle authored
      
      - allow all apps to connect to the keystore over unix socket
      - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files
      - mtp connects to dnsproxyd when a pptp vpn connection is established
      - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device
      - WifiWatchDog uses packet_socket when wifi comes up
      - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction
      - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject
      
      Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949
      Signed-off-by: default avatarJoshua Brindle <jbrindle@tresys.com>
      f26d8130
  11. Sep 24, 2012
    • Stephen Smalley's avatar
      Switch app_* and isolated to _app and _isolated in seapp_contexts. · 3ac1d26a
      Stephen Smalley authored
      
      The app_* syntax was a legacy of the original approach of looking up
      the username returned by getpwuid() and the original username encoding
      scheme by bionic.  With the recent changes to move away from this approach,
      there is no reason to retain that syntax.  Instead, just use _app to match
      app UIDs and _isolated to match isolated service UIDs.  The underscore
      prefix is to signify that these are not real usernames and to avoid
      conflicts with any system usernames.
      
      Requires a corresponding change to libselinux.
      
      Change-Id: Ic388a12c1c9d3e47386c8849db607140ef8a3d75
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      3ac1d26a
  12. Sep 20, 2012
  13. Jul 27, 2012
    • Stephen Smalley's avatar
    • Stephen Smalley's avatar
      Only enforce per-app process and file isolation via SELinux for third party... · b9760aa0
      Stephen Smalley authored
      Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps.
      
      Platform (any of the apps signed by build keys, i.e. platform|release|shared|media) apps expect to be able to share files with each other or with third party apps by passing open files or pathnames over Binder.  Therefore, we switch to only enforcing the per-app process and file isolation via SELinux on third party apps, not platform apps.
      
      Make the platform app domains mlstrustedsubjects so that they can access any files created by third party apps.
      Introduce a new platform_app_data_file type for platform apps so that we can mark it as a mlstrustedobject and allow third party apps to read/write files created by the platform apps.
      Specify this new type for the platform app entries in seapp_contexts.
      Remove levelFromUid=true for the platform apps in seapp_contexts since we are no longer enforcing per-app separation among them.
      b9760aa0
  14. Jun 28, 2012
  15. Jan 04, 2012
Loading