Skip to content
Snippets Groups Projects
  1. Oct 03, 2013
    • Alex Klyubin's avatar
      Restrict access to /dev/hw_random to system_server and init. · 8d688315
      Alex Klyubin authored
      /dev/hw_random is accessed only by init and by EntropyMixer (which
      runs inside system_server). Other domains are denied access because
      apps/services should be obtaining randomness from the Linux RNG.
      
      Change-Id: Ifde851004301ffd41b2189151a64a0c5989c630f
      8d688315
  2. May 09, 2013
  3. Apr 25, 2013
  4. Apr 24, 2013
  5. Apr 05, 2013
    • Stephen Smalley's avatar
      run-as policy fixes. · 74ba8c86
      Stephen Smalley authored
      - Remove dac_read_search as it is no longer required by run-as.
      - Introduce a separate type for /dev/tty so that we can allow use of own tty for
      for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
      - Allow sigchld notifications for death of run-as and its descendants by adbd.
      - Drop redundant rules for executing shell or system commands from untrusted_app;
      now covered by rules in app.te.
      
      Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
      74ba8c86
    • Robert Craig's avatar
      Remove unneeded device type. · 507304c2
      Robert Craig authored
      
      timerirq_device has been removed in favor
      of using the existing sensors_device domain.
      
      Change-Id: I503e4a511c2901890356559c0afb971392b4ec6f
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      507304c2
    • Stephen Smalley's avatar
      run-as policy fixes. · cd516a32
      Stephen Smalley authored
      - Remove dac_read_search as it is no longer required by run-as.
      - Introduce a separate type for /dev/tty so that we can allow use of own tty for
      for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
      - Allow sigchld notifications for death of run-as and its descendants by adbd.
      - Drop redundant rules for executing shell or system commands from untrusted_app;
      now covered by rules in app.te.
      
      Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
      cd516a32
  6. Apr 02, 2013
  7. Mar 29, 2013
  8. Mar 27, 2013
    • Geremy Condra's avatar
      Add policy for __properties__ device. · c0dc6680
      Geremy Condra authored
      Change-Id: Ie9b391283362fb6930f1ae858f0a879835c91e32
      c0dc6680
    • Robert Craig's avatar
      Various policy updates. · 65d4f44c
      Robert Craig authored
      
      Assortment of policy changes include:
       * Bluetooth domain to talk to init and procfs.
       * New device node domains.
       * Allow zygote to talk to its executable.
       * Update system domain access to new device node domains.
       * Create a post-process sepolicy with dontaudits removed.
       * Allow rild to use the tty device.
      
      Change-Id: Ibb96b590d0035b8f6d1606cd5e4393c174d10ffb
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      65d4f44c
  9. Mar 26, 2013
  10. Mar 23, 2013
  11. Mar 19, 2013
  12. Jul 19, 2012
    • hqjiang's avatar
      Target the denials/policies over qtaguid file and device: 1. Relabel... · 4c06d273
      hqjiang authored
      Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
      
      Actually, some of policies related to qtaguid have been there already, but
      we refind existing ones and add new ones.
      4c06d273
  13. Jul 12, 2012
  14. Jun 20, 2012
  15. May 31, 2012
  16. Jan 06, 2012
  17. Jan 04, 2012
Loading