- Jan 23, 2014
-
-
Nick Kralevich authored
When adbd runs as root, it transitions into the su domain. Add the various rules to support this. This is needed to run the adbd and shell domains in enforcing on userdebug / eng devices without breaking developer workflows. Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
-
- Jan 13, 2014
-
-
Nick Kralevich authored
Change-Id: Ic5aae78d575dba50d0a4bb78747da3ba4b81fb7b
-
- Jan 11, 2014
-
-
Nick Kralevich authored
adbd uses setpcap to drop capabilities from the bounding set on user builds. See system/core commit 080427e4e2b1b72718b660e16b6cf38b3a3c4e3f Change-Id: I6aec8d321b8210ea50a56aeee9bc94738514beab
-
- Jan 02, 2014
-
-
Stephen Smalley authored
Will likely want to split into adbd_user.te vs adbd.te before going enforcing to support adb root and adb remount on non-user builds. Possibly take all common rules to an adbdcommon.te. Change-Id: I63040c7f5f0fca10b3df682572c51c05e74738a7 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Dec 09, 2013
-
-
Stephen Smalley authored
Confine run-as (but leave permissive for now) and add other allow rules required for the use of run-as and ndk-gdb functionality. Change-Id: Ifae38233c091cd34013e98830d72aac4c4adcae0 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Oct 21, 2013
-
-
Nick Kralevich authored
This change removes the permissive line from unconfined domains. Unconfined domains can do (mostly) anything, so moving these domains into enforcing should be a no-op. The following domains were deliberately NOT changed: 1) kernel 2) init In the future, this gives us the ability to tighten up the rules in unconfined, and have those tightened rules actually work. When we're ready to tighten up the rules for these domains, we can: 1) Remove unconfined_domain and re-add the permissive line. 2) Submit the domain in permissive but NOT unconfined. 3) Remove the permissive line 4) Wait a few days and submit the no-permissive change. For instance, if we were ready to do this for adb, we'd identify a list of possible rules which allow adbd to work, re-add the permissive line, and then upload those changes to AOSP. After sufficient testing, we'd then move adb to enforcing. We'd repeat this for each domain until everything is enforcing and out of unconfined. Change-Id: If674190de3262969322fb2e93d9a0e734f8b9245
-
- Oct 01, 2013
-
-
Stephen Smalley authored
The /adb_keys entry will only take effect if a restorecon is applied by init.rc on a kernel that includes the rootfs labeling support, but does no harm otherwise. The /data/misc/adb labeling ensures correct labeling of the adb_keys file created if the device has ro.adb.secure=1 set. Allow adbd to read the file. Change-Id: I97b3d86a69681330bba549491a2fb39df6cf20ef Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- May 20, 2013
-
-
repo sync authored
This prevents denials from being generated by the base policy. Over time, these rules will be incrementally tightened to improve security. Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
-
- May 10, 2013
-
-
Alex Klyubin authored
Change-Id: Id41891b89c7b067919cbda06ab97d5eff2ad044f
-
- May 09, 2013
-
-
Nick Kralevich authored
sys_boot is not needed for adb as of system/core commit ca8e66a8b0f843812014a28d49208f9f6f64ecbc sys_boot is not needed for system server as of frameworks/base commit dbcf2d7482562eff45ac727cea799b37a260e399 Change-Id: I61379ea858e05acd239c9b16e4e2bf454af3f51c
-
- May 01, 2013
-
-
repo sync authored
Long term this should be scoped down. Change-Id: I261f05568566cca38bc5c43fbfa7ff1c816e5846
-
- Apr 25, 2013
-
-
Nick Kralevich authored
This rule doesn't work, as /proc/sysrq-trigger isn't properly labeled. Revert this change for now. This reverts commit bb2591e5.
-
- Apr 05, 2013
-
-
Geremy Condra authored
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Apr 04, 2013
-
-
Geremy Condra authored
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Apr 03, 2013
-
-
Geremy Condra authored
Change-Id: I73a2b841ab3399b7528b8084a5c4736e6ecea48a
-
Geremy Condra authored
Change-Id: I73a2b841ab3399b7528b8084a5c4736e6ecea48a
-
- Mar 27, 2013
-
-
Geremy Condra authored
This reverts commit ba84bf1d Hidden dependency resolved. Change-Id: I9f0844f643abfda8405db2c722a36c847882c392
-
- Mar 22, 2013
-
-
Geremy Condra authored
This reverts commit 8a814a76 Change-Id: Id1497cc42d07ee7ff2ca44ae4042fc9f2efc9aad
-
Stephen Smalley authored
Change-Id: I5a3584b6cc5eda2b7d82e85452f9fe457877f1d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 19, 2012
-
-
Stephen Smalley authored
Update policy for Android 4.2 / latest master. Primarily this consists of changes around the bluetooth subsystem. The zygote also needs further permissions to set up /storage/emulated. adbd service now gets a socket under /dev/socket. keystore uses the binder. Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Apr 03, 2012
-
-
Stephen Smalley authored
-
- Mar 07, 2012
-
-
Stephen Smalley authored
-
- Jan 12, 2012
-
-
Stephen Smalley authored
Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file.
-
- Jan 04, 2012
-
-
Stephen Smalley authored
-