- Mar 23, 2013
-
-
Geremy Condra authored
-
Geremy Condra authored
-
rpcraig authored
Change-Id: I7ff4ed9f73f43918cac05a026af68cca8dbe02c3 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
rpcraig authored
Change-Id: Ib0bdcbc1a7e45e1d1a046c9fa8aff89183ebfe0d
-
rpcraig authored
Add new dev_type: - ump_device : Unified Memory Provider driver. The file_contexts entry should be described on a per device basis. Minor adjustments: - tee needs netlink socket access. - ueventd needs to grant file operations. Change-Id: I915304da687d3a2b9aa417e6f91ea915bd697676 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
rpcraig authored
Allow device node access irrespective of MLS restrictions. Third party apps (untrusted_app) domains need access too. Change-Id: I132b8201bccb1ff31dc0c15a735f81f645c9836d
-
Robert Craig authored
Initial policy for racoon (IKE key management). Signed-off-by:
Robert Craig <rpcraig@tycho.ncsc.mil> Change-Id: If1e344f39ea914e42afbaa021b272ba1b7113479
-
- Mar 22, 2013
-
-
Geremy Condra authored
-
Geremy Condra authored
This reverts commit 8a814a76 Change-Id: Id1497cc42d07ee7ff2ca44ae4042fc9f2efc9aad
-
Geremy Condra authored
* changes: Various minor policy fixes based on CTS. Split internal and external sdcards Give sdcard sys_admin capability.
-
Stephen Smalley authored
Change-Id: I5a3584b6cc5eda2b7d82e85452f9fe457877f1d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
Two new types are introduced: sdcard_internal sdcard_external The existing type of sdcard, is dropped and a new attribute sdcard_type is introduced. The boolean app_sdcard_rw has also been changed to allow for controlling untrusted_app domain to use the internal and external sdcards. Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
-
Robert Craig authored
Change-Id: I2d4ace75f3e75f47f99e93d58922d5719b47fffe
-
Stephen Smalley authored
Change-Id: Ia061aa3b19229b96f643ca0285a7fa5fa06fd780 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
rpcraig authored
Policy to allow bluetooth tethering. Change-Id: Ic24c97b0e1dc93395b8381b78ca4929baa30337c Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
William Roberts authored
Change-Id: I3b35b68247f35d5d9d9afd33c203aa97e437dc14
-
William Roberts authored
Update the file_contexts for the new location of the policy files, as well as update the policy for the management of these types. Change-Id: Idc475901ed437efb325807897e620904f4ff03e9
-
- Mar 21, 2013
-
-
Stephen Smalley authored
Change-Id: I571731169036a3203d0145af67f45b3d9eb6366b Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
-
Stephen Smalley authored
Change-Id: Ieeaa002061c9e4224ea90dfa60dffb112aa152c2 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
Change-Id: I58f15889c248b49f9e29028a3c0a86b4c950ff07
-
William Roberts authored
See README for further details. Change-Id: I4599c7ecd5a552e38de89d0a9e496e047068fe05
-
- Mar 20, 2013
-
-
Geremy Condra authored
-
Stephen Smalley authored
Introduce a levelFrom=none|app|user|all syntax for specifying per-app, per-user, or per-combination level assignment. levelFromUid=true|false remains valid syntax but is deprecated. levelFromUid=true is equivalent to levelFrom=app. Update check_seapp to accept the new syntax. Update seapp_contexts to document the new syntax and switch from levelFromUid=true to levelFrom=app. No change in behavior. Change-Id: Ibaddeed9bc3e2586d524efc2f1faa5ce65dea470 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
-
Geremy Condra authored
-
- Mar 19, 2013
-
-
William Roberts authored
In normal, user builds, shell doesn't have the required DAC permissions to acess the kernel log. Change-Id: I001e6d65f508e07671bdb71ca2c0e1d53bc5b970
-
Geremy Condra authored
This reverts commit 22fc0410 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
-
William Roberts authored
Change-Id: I5d5362ad0055275052b0c2ba535b599a8e26112e
-
rpcraig authored
Initial policy for software watchdog daemon which is started by init. Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
The binder_transfer_binder hook was changed in the kernel, obsoleting the receive permission and changing the target of the transfer permission. Update the binder-related policy to match the revised permission checking. Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Ie79ff3fb9c0a893e348c4adb2f457cae42d7800f Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Ie58185519252dad29a23d0d3d54b1cbafea83a83 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I8265e34a76913a76eedd2d7a6fe3b14945fde924 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Iad4ad43ce7ba3c00b69b7aac752b40bc2d3be002 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
-
Geremy Condra authored
-
Stephen Smalley authored
Change-Id: I384ea9516a5ed2369f7fa703499e284e29a2c0eb Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Geremy Condra authored
-
Robert Craig authored
Change-Id: If361ea93fabd343728196eed2663fd572ecaa70b Signed-off-by:
Robert Craig <rpcraig@tycho.ncsc.mil>
-