- Oct 29, 2013
-
-
Stephen Smalley authored
Change-Id: Id6d89e7d87642fba22445484034e39f94bb90f5b Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Oct 21, 2013
-
-
Nick Kralevich authored
This change removes the permissive line from unconfined domains. Unconfined domains can do (mostly) anything, so moving these domains into enforcing should be a no-op. The following domains were deliberately NOT changed: 1) kernel 2) init In the future, this gives us the ability to tighten up the rules in unconfined, and have those tightened rules actually work. When we're ready to tighten up the rules for these domains, we can: 1) Remove unconfined_domain and re-add the permissive line. 2) Submit the domain in permissive but NOT unconfined. 3) Remove the permissive line 4) Wait a few days and submit the no-permissive change. For instance, if we were ready to do this for adb, we'd identify a list of possible rules which allow adbd to work, re-add the permissive line, and then upload those changes to AOSP. After sufficient testing, we'd then move adb to enforcing. We'd repeat this for each domain until everything is enforcing and out of unconfined. Change-Id: If674190de3262969322fb2e93d9a0e734f8b9245
-
- May 20, 2013
-
-
repo sync authored
This prevents denials from being generated by the base policy. Over time, these rules will be incrementally tightened to improve security. Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
-
- May 15, 2013
-
-
repo sync authored
Bug: 4070557 Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
-
- Apr 25, 2013
-
-
Ben Murdoch authored
This reverts commit 69fbbdd5.
-
repo sync authored
Some of these will get factored out into device-specific configs later. Change-Id: I359915e2607b56112bb22456d28e06c162fcbdff
-
Geremy Condra authored
This reverts commit e7e54fac Change-Id: I26b577cf46a0eaccf6adf7ae851383a10bf03b4b
-
Geremy Condra authored
This reverts commit 1c101164 Restoring now that the conflict with tuna has passed. Change-Id: I587dab8d7102c913fc03825a006e96d76680858d
-
- Apr 24, 2013
-
-
Geremy Condra authored
This reverts commit f51e9007 Looks like this caused a build breakage in master, may have a duplicate rule from AOSP. Change-Id: I4ea83a47baec4ffa2840b5fe50b6f55e1eeda53c
-
repo sync authored
Some of these will get factored out into device-specific configs later. Change-Id: I7ea9c22a666b13bca2d867e5bcc7084ed7129de3
-
- Mar 27, 2013
-
-
Geremy Condra authored
This reverts commit ba84bf1d Hidden dependency resolved. Change-Id: I9f0844f643abfda8405db2c722a36c847882c392
-
- Mar 22, 2013
-
-
Geremy Condra authored
This reverts commit 8a814a76 Change-Id: Id1497cc42d07ee7ff2ca44ae4042fc9f2efc9aad
-
Stephen Smalley authored
Change-Id: I5a3584b6cc5eda2b7d82e85452f9fe457877f1d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 19, 2013
-
-
Stephen Smalley authored
The binder_transfer_binder hook was changed in the kernel, obsoleting the receive permission and changing the target of the transfer permission. Update the binder-related policy to match the revised permission checking. Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Jul 12, 2012
-
-
Stephen Smalley authored
-
- Apr 04, 2012
-
-
Stephen Smalley authored
New property_contexts file for property selabel backend. New property.te file with property type declarations. New property_service security class and set permission. Allow rules for setting properties.
-
- Jan 04, 2012
-
-
Stephen Smalley authored
-