Skip to content
Snippets Groups Projects
  1. May 02, 2013
  2. Apr 25, 2013
  3. Apr 24, 2013
  4. Apr 05, 2013
    • Geremy Condra's avatar
      Add the sysrq_file special file and give ADB write access. · bb2591e5
      Geremy Condra authored
      Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
      bb2591e5
    • Geremy Condra's avatar
      Add downloaded file policy. · bfb26e7b
      Geremy Condra authored
      Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
      bfb26e7b
    • Stephen Smalley's avatar
      run-as policy fixes. · 74ba8c86
      Stephen Smalley authored
      - Remove dac_read_search as it is no longer required by run-as.
      - Introduce a separate type for /dev/tty so that we can allow use of own tty for
      for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
      - Allow sigchld notifications for death of run-as and its descendants by adbd.
      - Drop redundant rules for executing shell or system commands from untrusted_app;
      now covered by rules in app.te.
      
      Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
      74ba8c86
    • Robert Craig's avatar
      Add new domains for private apps. · ffd8c441
      Robert Craig authored
      
      /data/app-private is used when making an
      app purchase or forward locking. Provide a
      new label for the directory as well as the
      tmp files that appear under it.
      
      Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      ffd8c441
  5. Mar 29, 2013
  6. Mar 27, 2013
  7. Mar 26, 2013
  8. Mar 23, 2013
  9. Mar 22, 2013
  10. Mar 20, 2013
    • Colin Cross's avatar
      sepolicy: add /vendor to file_contexts · 46495241
      Colin Cross authored
      /vendor has the same permissions as /system/vendor for devices
      that have a separate vendor partition.
      
      Bug: 8341435
      Change-Id: If0c78b31f8a6e8e5680f1d076c323d1628fb07b2
      46495241
  11. Mar 19, 2013
    • rpcraig's avatar
      watchdog security policy. · bac9992e
      rpcraig authored
      
      Initial policy for software watchdog daemon
      which is started by init.
      
      Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      bac9992e
    • William Roberts's avatar
      Do not allow access to device:chr_file for system · 6a64897a
      William Roberts authored
      Also labels /dev/mpu and /dev/mpuirq as gps device.
      mpu is motion processing unit and is resposible for
      gyroscope functionality.
      
      Change-Id: If7f1a5752c550b72fac681566e1052f09e139ff0
      6a64897a
    • rpcraig's avatar
      App data backup security policy. · 1c8464e1
      rpcraig authored
      
      Policy covers:
      
       * backup_data_file type for labeling all
         files/dirs under /data dealing with
         backup mechanism.
      
       * cache_backup_file type for labeling all
         files/dirs under /cache dealing with
         backup mechanism. This also covers the
         the use of LocalTransport for local archive
         and restore testing.
      
       * the use of 'adb shell bmgr' to initiate
         backup mechanism from shell.
      
       * the use of 'adb backup/restore' to archive
         and restore the device's data.
      
      Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      1c8464e1
  12. Jan 11, 2013
    • Stephen Smalley's avatar
      Fix invalid specification for adb_keys. · 58b0fb6d
      Stephen Smalley authored
      
      A prior change added an entry for adb_keys without any security context,
      yielding warnings like the following during build:
      out/target/product/manta/root/file_contexts:  line 7 is missing fields, skipping
      
      This adds the missing security context field.
      
      Change-Id: If48731c8aa7d22a3f547d0854f288ff68f9006da
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      58b0fb6d
  13. Dec 21, 2012
    • Colin Cross's avatar
      add file_contexts entries for root filesystem · 92b9aa0e
      Colin Cross authored
      It may be useful to generate an ext4 image of the root filesystem
      instead of using a ramdisk.  Whitelist entries in file_contexts to
      support selinux labeling a root filesystem image.
      
      Change-Id: I91a38d0aee4408c46cbfe5dc5e6eda198572e90f
      92b9aa0e
  14. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  15. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  16. Oct 22, 2012
  17. Oct 17, 2012
  18. Sep 26, 2012
  19. Sep 20, 2012
  20. Aug 24, 2012
  21. Aug 20, 2012
    • rpcraig's avatar
      Add ppp/mtp policy. · d49f7e6e
      rpcraig authored
      Initial policy for Point-to-Point tunneling and
      tunneling manager services.
      d49f7e6e
  22. Aug 15, 2012
  23. Jul 30, 2012
  24. Jul 19, 2012
    • hqjiang's avatar
      Target the denials/policies over qtaguid file and device: 1. Relabel... · 4c06d273
      hqjiang authored
      Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
      
      Actually, some of policies related to qtaguid have been there already, but
      we refind existing ones and add new ones.
      4c06d273
    • hqjiang's avatar
      allow camera calibration · 20d6963a
      hqjiang authored
      20d6963a
  25. Jul 12, 2012
Loading