Skip to content
Snippets Groups Projects
  1. May 15, 2013
  2. May 08, 2013
  3. Apr 05, 2013
  4. Mar 29, 2013
  5. Mar 28, 2013
  6. Mar 27, 2013
  7. Mar 23, 2013
  8. Mar 22, 2013
  9. Mar 19, 2013
    • Stephen Smalley's avatar
      Update binder-related policy. · 9ce99e39
      Stephen Smalley authored
      
      The binder_transfer_binder hook was changed in the kernel, obsoleting
      the receive permission and changing the target of the transfer permission.
      Update the binder-related policy to match the revised permission checking.
      
      Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      9ce99e39
    • Stephen Smalley's avatar
      Only allow read/write not open on platform_app_data_file. · c8106f12
      Stephen Smalley authored
      
      Change-Id: Iad4ad43ce7ba3c00b69b7aac752b40bc2d3be002
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      c8106f12
    • rpcraig's avatar
      App data backup security policy. · 1c8464e1
      rpcraig authored
      
      Policy covers:
      
       * backup_data_file type for labeling all
         files/dirs under /data dealing with
         backup mechanism.
      
       * cache_backup_file type for labeling all
         files/dirs under /cache dealing with
         backup mechanism. This also covers the
         the use of LocalTransport for local archive
         and restore testing.
      
       * the use of 'adb shell bmgr' to initiate
         backup mechanism from shell.
      
       * the use of 'adb backup/restore' to archive
         and restore the device's data.
      
      Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      1c8464e1
  10. Dec 05, 2012
  11. Oct 22, 2012
  12. Oct 16, 2012
    • Joshua Brindle's avatar
      allow apps access to the keystore, dhcp/pptp fixes, wifi fixes and isolated_app access · f26d8130
      Joshua Brindle authored
      
      - allow all apps to connect to the keystore over unix socket
      - dhcp runs scripts in /system/etc/dhcpcd/dhcpcd-hooks and creates/removes lease files
      - mtp connects to dnsproxyd when a pptp vpn connection is established
      - allow appdomain to also open qtaguid_proc and release_app to read qtaguid_device
      - WifiWatchDog uses packet_socket when wifi comes up
      - apps interact with isolated_apps when an app uses an isolated service and uses sockets for that interaction
      - for apps with levelFromUid=true to interact with isolated_app, isolated_app must be an mlstrustedsubject
      
      Change-Id: I09ff676267ab588ad4c73f04d8f23dba863c5949
      Signed-off-by: default avatarJoshua Brindle <jbrindle@tresys.com>
      f26d8130
  13. Sep 20, 2012
  14. Aug 10, 2012
  15. Jul 30, 2012
  16. Jul 27, 2012
    • Haiqing Jiang's avatar
    • Haiqing Jiang's avatar
      Platform app domain sdcard accesses · 7585fc64
      Haiqing Jiang authored
      7585fc64
    • Stephen Smalley's avatar
      Only enforce per-app process and file isolation via SELinux for third party... · b9760aa0
      Stephen Smalley authored
      Only enforce per-app process and file isolation via SELinux for third party apps, not platform apps.
      
      Platform (any of the apps signed by build keys, i.e. platform|release|shared|media) apps expect to be able to share files with each other or with third party apps by passing open files or pathnames over Binder.  Therefore, we switch to only enforcing the per-app process and file isolation via SELinux on third party apps, not platform apps.
      
      Make the platform app domains mlstrustedsubjects so that they can access any files created by third party apps.
      Introduce a new platform_app_data_file type for platform apps so that we can mark it as a mlstrustedobject and allow third party apps to read/write files created by the platform apps.
      Specify this new type for the platform app entries in seapp_contexts.
      Remove levelFromUid=true for the platform apps in seapp_contexts since we are no longer enforcing per-app separation among them.
      b9760aa0
  17. Jul 19, 2012
    • hqjiang's avatar
      Target the denials/policies over qtaguid file and device: 1. Relabel... · 4c06d273
      hqjiang authored
      Target the denials/policies over qtaguid file and device: 1. Relabel /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device.
      
      Actually, some of policies related to qtaguid have been there already, but
      we refind existing ones and add new ones.
      4c06d273
  18. Jul 12, 2012
  19. Jun 28, 2012
  20. Jun 27, 2012
  21. Apr 04, 2012
Loading