Skip to content
Snippets Groups Projects
  1. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  2. Oct 17, 2012
  3. Oct 16, 2012
    • Joshua Brindle's avatar
      allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access · f26d8130
      Joshua Brindle authored
      
      - allow all apps to connect to the keystore over unix socket
      - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files
      - mtp connects to dnsproxyd when a pptp vpn connection is established
      - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device
      - WifiWatchDog uses packet_socket when wifi comes up
      - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction
      - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject
      
      Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949
      Signed-off-by: default avatarJoshua Brindle <jbrindle@tresys.com>
      f26d8130
  4. Sep 20, 2012
  5. Aug 20, 2012
    • rpcraig's avatar
      Add ppp/mtp policy. · d49f7e6e
      rpcraig authored
      Initial policy for Point-to-Point tunneling and
      tunneling manager services.
      d49f7e6e
  6. Aug 09, 2012
  7. Jul 31, 2012
  8. Jul 27, 2012
  9. Jul 24, 2012
  10. Jul 19, 2012
    • hqjiang's avatar
      Target the denials/policies over qtaguid file and device: 1. Relabel... · 4c06d273
      hqjiang authored
      Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
      
      Actually, some of policies related to qtaguid have been there already, but
      we refind existing ones and add new ones.
      4c06d273
  11. Jul 12, 2012
  12. Jun 28, 2012
  13. Jun 27, 2012
  14. Apr 13, 2012
  15. Apr 04, 2012
    • Stephen Smalley's avatar
      Rework the radio vs rild property split. · 730957ae
      Stephen Smalley authored
      Only label properties with the ril. prefix with rild_prop.
      Allow rild and system (and radio) to set radio_prop.
      Only rild can set rild_prop presently.
      730957ae
    • Stephen Smalley's avatar
      Add policy for property service. · 124720a6
      Stephen Smalley authored
      New property_contexts file for property selabel backend.
      New property.te file with property type declarations.
      New property_service security class and set permission.
      Allow rules for setting properties.
      124720a6
  16. Mar 19, 2012
  17. Mar 07, 2012
  18. Feb 02, 2012
  19. Jan 10, 2012
  20. Jan 06, 2012
  21. Jan 04, 2012
Loading