Skip to content
Snippets Groups Projects
  1. Jan 23, 2014
    • Nick Kralevich's avatar
      Support running adbd in the su domain. · 7d0f955e
      Nick Kralevich authored
      When adbd runs as root, it transitions into the
      su domain. Add the various rules to support this.
      
      This is needed to run the adbd and shell domains in
      enforcing on userdebug / eng devices without breaking
      developer workflows.
      
      Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
      7d0f955e
  2. Jan 13, 2014
  3. Jan 11, 2014
    • Nick Kralevich's avatar
      allow adbd setpcap · 40ce0bb8
      Nick Kralevich authored
      adbd uses setpcap to drop capabilities from the bounding
      set on user builds. See system/core commit
      080427e4e2b1b72718b660e16b6cf38b3a3c4e3f
      
      Change-Id: I6aec8d321b8210ea50a56aeee9bc94738514beab
      40ce0bb8
  4. Jan 02, 2014
  5. Dec 09, 2013
  6. Oct 21, 2013
    • Nick Kralevich's avatar
      Move unconfined domains out of permissive mode. · 353c72e3
      Nick Kralevich authored
      This change removes the permissive line from unconfined
      domains. Unconfined domains can do (mostly) anything, so moving
      these domains into enforcing should be a no-op.
      
      The following domains were deliberately NOT changed:
      1) kernel
      2) init
      
      In the future, this gives us the ability to tighten up the
      rules in unconfined, and have those tightened rules actually
      work.
      
      When we're ready to tighten up the rules for these domains,
      we can:
      
      1) Remove unconfined_domain and re-add the permissive line.
      2) Submit the domain in permissive but NOT unconfined.
      3) Remove the permissive line
      4) Wait a few days and submit the no-permissive change.
      
      For instance, if we were ready to do this for adb, we'd identify
      a list of possible rules which allow adbd to work, re-add
      the permissive line, and then upload those changes to AOSP.
      After sufficient testing, we'd then move adb to enforcing.
      We'd repeat this for each domain until everything is enforcing
      and out of unconfined.
      
      Change-Id: If674190de3262969322fb2e93d9a0e734f8b9245
      353c72e3
  7. Oct 01, 2013
    • Stephen Smalley's avatar
      Label adb keys file and allow access to it. · 55540755
      Stephen Smalley authored
      
      The /adb_keys entry will only take effect if a restorecon is
      applied by init.rc on a kernel that includes the rootfs labeling
      support, but does no harm otherwise.
      
      The /data/misc/adb labeling ensures correct labeling of the adb_keys
      file created if the device has ro.adb.secure=1 set.
      
      Allow adbd to read the file.
      
      Change-Id: I97b3d86a69681330bba549491a2fb39df6cf20ef
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      55540755
  8. May 20, 2013
    • repo sync's avatar
      Make all domains unconfined. · 77d4731e
      repo sync authored
      This prevents denials from being generated by the base policy.
      Over time, these rules will be incrementally tightened to improve
      security.
      
      Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
      77d4731e
  9. May 10, 2013
  10. May 09, 2013
    • Nick Kralevich's avatar
      Remove sys_boot · 2bfb59df
      Nick Kralevich authored
      sys_boot is not needed for adb as of system/core commit
      ca8e66a8b0f843812014a28d49208f9f6f64ecbc
      
      sys_boot is not needed for system server as of frameworks/base
      commit dbcf2d7482562eff45ac727cea799b37a260e399
      
      Change-Id: I61379ea858e05acd239c9b16e4e2bf454af3f51c
      2bfb59df
  11. May 01, 2013
  12. Apr 25, 2013
  13. Apr 05, 2013
  14. Apr 04, 2013
  15. Apr 03, 2013
  16. Mar 27, 2013
  17. Mar 22, 2013
  18. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  19. Apr 03, 2012
  20. Mar 07, 2012
  21. Jan 12, 2012
  22. Jan 04, 2012
Loading