- May 06, 2013
-
-
Alex Klyubin authored
Properties under bluetooth. and persist.service.bdroid. are considered Bluetooth-related properties. Change-Id: Iee937d9a1184c2494deec46f9ed7090c643acda7
-
- May 03, 2013
-
-
Geremy Condra authored
Merge "Expand permissions for 3 existing allow policies for rild and a new one for rild." into jb-mr2-dev
-
William Luh authored
Change-Id: Iafe68ac1b742e40c1a23a2f6cfd6373ea89cc07b
-
- May 02, 2013
-
-
repo sync authored
Change-Id: I168f681d8c67f470b6e639f0b1bf39346c4eb396
-
- May 01, 2013
- Apr 26, 2013
-
-
William Luh authored
Change-Id: Ia7457e3fd4f1100bbee821f412e80ba17fede5ec
-
- Apr 25, 2013
-
-
William Luh authored
Change-Id: Ie96d573be971b2dcc3d60614794ba9ca13b31471
-
William Luh authored
Change-Id: Iaa8fb6fa8726d083ee3c49edbbd398f0e8f33a37
-
Nick Kralevich authored
This rule doesn't work, as /proc/sysrq-trigger isn't properly labeled. Revert this change for now. This reverts commit bb2591e5.
-
Ben Murdoch authored
This reverts commit 69fbbdd5.
-
repo sync authored
-
repo sync authored
Some of these will get factored out into device-specific configs later. Change-Id: I359915e2607b56112bb22456d28e06c162fcbdff
-
Geremy Condra authored
This reverts commit e7e54fac Change-Id: I26b577cf46a0eaccf6adf7ae851383a10bf03b4b
-
Geremy Condra authored
This reverts commit 1c101164 Restoring now that the conflict with tuna has passed. Change-Id: I587dab8d7102c913fc03825a006e96d76680858d
-
- Apr 24, 2013
-
-
Geremy Condra authored
This reverts commit f51e9007 Looks like this caused a build breakage in master, may have a duplicate rule from AOSP. Change-Id: I4ea83a47baec4ffa2840b5fe50b6f55e1eeda53c
-
repo sync authored
Some of these will get factored out into device-specific configs later. Change-Id: I7ea9c22a666b13bca2d867e5bcc7084ed7129de3
-
- Apr 05, 2013
-
-
Geremy Condra authored
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
-
Geremy Condra authored
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
-
Geremy Condra authored
Bug: 8539042 Change-Id: I6a9c3247688f49bed4a1637c728e77c2e865afd2
-
Geremy Condra authored
Bug: 8539042 Change-Id: I255930759ce0612f6ec9b931bfe545342ef808fc
-
Geremy Condra authored
Bug: 8539042 Change-Id: I87165fd83b1abef9eb7bf4c403714150aaefed6e
-
Geremy Condra authored
Bug: 8539042 Change-Id: I31e7a3ae6ba783b78c3b38756966950a20f2f2aa
-
Geremy Condra authored
Bug: 8539042 Change-Id: I27bcc4a485b031d54e17b03164642821d546e62f
-
William Roberts authored
/data/security is another location that policy files can reside. In fact, these policy files take precedence over their rootfs counterparts under certain circumstances. Give the appropriate players the rights to read these policy files. Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
-
Stephen Smalley authored
- Remove dac_read_search as it is no longer required by run-as. - Introduce a separate type for /dev/tty so that we can allow use of own tty for for a run-as shell without allowing access to other /dev/tty[0-9]* nodes. - Allow sigchld notifications for death of run-as and its descendants by adbd. - Drop redundant rules for executing shell or system commands from untrusted_app; now covered by rules in app.te. Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
-
Robert Craig authored
/data/app-private is used when making an app purchase or forward locking. Provide a new label for the directory as well as the tmp files that appear under it. Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
As AOSP does not support the device admin API or the older SEManager system app, just drop the allow rules associated with permitting SELinux management via device admin or a system app. Change-Id: Icdf40c9e6d343b19c156e4c7aea4cfb8c5f234ad Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I09b4e33b1c9ea201a96d2f07cb74bdb804b5aad2 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
The test gracefully handles unreadable directories, so we do not need to allow this for all file types. Change-Id: Ib5f5be7cacc3f0270b72c046200cc3d21f3fc374 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I448a5553937a98775178b94f289ccb45ae862876 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Redundant with other rules or not required for untrusted app. Change-Id: Idb5d50326cc14696423cf133508c0d013c5928a6 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Read access to /dev/log/* is no longer restricted. Filtering on reads is performed per-uid by the kernel logger driver. Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Required for If8b8d66120453123c1371ce063b6f20e8b96b6ef . Change-Id: I98871b957db8b291cbbb827b5eb39b4279ce4194 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Robert Craig authored
timerirq_device has been removed in favor of using the existing sensors_device domain. Change-Id: I503e4a511c2901890356559c0afb971392b4ec6f Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Stephen Smalley authored
Increase the SELinux policy version to 26. This is needed for name-based transitions used by the manta sepolicy. Requires kernel 3.0 or higher. Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-